Sciweavers

2270 search results - page 58 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CCS
2008
ACM
13 years 10 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
14 years 2 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
LICS
2012
IEEE
11 years 11 months ago
Logics of Dynamical Systems
—We study the logic of dynamical systems, that is, logics and proof principles for properties of dynamical systems. Dynamical systems are mathematical models describing how the s...
André Platzer
I3E
2001
196views Business» more  I3E 2001»
13 years 10 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
JPDC
2007
86views more  JPDC 2007»
13 years 8 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin