Sciweavers

2270 search results - page 49 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
AGENTS
1999
Springer
15 years 7 months ago
A Catalog of Agent Coordination Patterns
This paper surveys the current state of the art in agentoriented software engineering, focusing on the area of coordinated multi-agent systems. In multi-agent systems, the interac...
Sandra C. Hayden, Christina Carrick, Qiang Yang
134
Voted
CSSE
2008
IEEE
15 years 10 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
152
Voted
SICHERHEIT
2010
15 years 1 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
COMPSAC
2006
IEEE
15 years 9 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
CONCUR
2006
Springer
15 years 7 months ago
Probability and Nondeterminism in Operational Models of Concurrency
We give a brief overview of operational models for concurrent systems that exhibit probabilistic behavior, focussing on the interplay between probability and nondeterminism. Our su...
Roberto Segala