Sciweavers

2270 search results - page 45 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CHI
2005
ACM
14 years 9 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
FORMATS
2005
Springer
14 years 2 months ago
Diagonal Constraints in Timed Automata: Forward Analysis of Timed Systems
Timed automata (TA) are a widely used model for real-time systems. Several tools are dedicated to this model, and they mostly implement a forward analysis for checking reachability...
Patricia Bouyer, François Laroussinie, Pier...
IH
1998
Springer
14 years 27 days ago
Modeling the Security of Steganographic Systems
Jan Zöllner, Hannes Federrath, Herbert Kliman...
COMPSEC
2010
86views more  COMPSEC 2010»
13 years 8 months ago
A knowledgeable security model for distributed health information systems
Liang Xiao 0002, Bo Hu, Madalina Croitoru, Paul H....