Sciweavers

2270 search results - page 54 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
115
Voted
EUROPKI
2007
Springer
15 years 9 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
114
Voted
ZUM
2000
Springer
15 years 7 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
138
Voted
CSFW
2005
IEEE
15 years 9 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
WSC
2004
15 years 4 months ago
Simulation of an Airport Passenger Security System
As part of the new security environment at the nation's airports, discrete event simulation modeling was applied shortly after 9-11 to understand the operational dynamics of ...
David R. Pendergraft, Craig V. Robertson, Shelly S...
82
Voted
ICEIS
2007
IEEE
15 years 9 months ago
Modelling of Message Security Concerns with UML
Farid Mehr, Ulf Schreier