Sciweavers

2270 search results - page 45 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CHI
2005
ACM
16 years 3 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
115
Voted
FORMATS
2005
Springer
15 years 9 months ago
Diagonal Constraints in Timed Automata: Forward Analysis of Timed Systems
Timed automata (TA) are a widely used model for real-time systems. Several tools are dedicated to this model, and they mostly implement a forward analysis for checking reachability...
Patricia Bouyer, François Laroussinie, Pier...
IH
1998
Springer
15 years 7 months ago
Modeling the Security of Steganographic Systems
Jan Zöllner, Hannes Federrath, Herbert Kliman...
84
Voted
COMPSEC
2010
86views more  COMPSEC 2010»
15 years 3 months ago
A knowledgeable security model for distributed health information systems
Liang Xiao 0002, Bo Hu, Madalina Croitoru, Paul H....