Sciweavers

2270 search results - page 67 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
FUIN
2008
103views more  FUIN 2008»
13 years 8 months ago
LDYIS: a Framework for Model Checking Security Protocols
We present a formalism for the automatic verification of security protocols based on multi-agent systems semantics. We give the syntax and semantics of a temporal-epistemic securit...
Alessio Lomuscio, Wojciech Penczek
ACG
2009
Springer
14 years 3 months ago
Data Assurance in Opaque Computations
The chess endgame is increasingly being seen through the lens of, and therefore effectively defined by, a data ‘model’ of itself. It is vital that such models are clearly faith...
Joe Hurd, Guy Haworth
AUTOMATICA
2007
61views more  AUTOMATICA 2007»
13 years 8 months ago
Errors-in-variables methods in system identification
Abstract: The paper gives a survey of errors-in-variables methods in system identification. Background and motivation are given, and examples illustrate why the identification pr...
Torsten Söderström
SACMAT
2011
ACM
12 years 11 months ago
An approach to modular and testable security models of real-world health-care applications
t http://www.brucker.ch/bibliography/abstract/ brucker.ea-model-based-2011 by permission of ACM for your personal use. Not for redistribution. The definitive version was published...
Achim D. Brucker, Lukas Brügger, Paul Kearney...
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 3 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood