Sciweavers

2270 search results - page 44 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
14 years 2 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler
JUCS
2002
113views more  JUCS 2002»
13 years 8 months ago
The Origins and the Development of the ASM Method for High Level System Design and Analysis
: The research belonging to the Abstract State Machines approach to system design and analysis is surveyed and documented in an annotated ASM bibliography. The survey covers the pe...
Egon Börger
ACSAC
2000
IEEE
14 years 1 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
JIPS
2010
110views more  JIPS 2010»
13 years 3 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
SACMAT
2003
ACM
14 years 1 months ago
Model driven security for process-oriented systems
David A. Basin, Jürgen Doser, Torsten Lodders...