Sciweavers

2270 search results - page 54 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
EUROPKI
2007
Springer
14 years 2 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
ZUM
2000
Springer
14 years 8 days ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
CSFW
2005
IEEE
14 years 2 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
WSC
2004
13 years 10 months ago
Simulation of an Airport Passenger Security System
As part of the new security environment at the nation's airports, discrete event simulation modeling was applied shortly after 9-11 to understand the operational dynamics of ...
David R. Pendergraft, Craig V. Robertson, Shelly S...