Sciweavers

2270 search results - page 39 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CCS
2007
ACM
14 years 2 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
ECIS
2001
13 years 10 months ago
Model and architecture for a virtual one stop public administration
The goal of this research was to develop a model of architecture for a virtual one-stop public administration. The first part of our work was to collect data during a six-month su...
Olivier Glassey
MASCOTS
2003
13 years 10 months ago
Software Performance Modeling Using UML and Petri Nets
Abstract. Software systems are today one of the most complex artifacts, they are simultaneously used by hundred-thousand of people sometimes in risk real time operations, such as a...
José Merseguer, Javier Campos
CCS
2006
ACM
14 years 12 days ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 10 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...