Sciweavers

2270 search results - page 6 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
PST
2004
13 years 8 months ago
Secure Public Instant Messaging
We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in l...
Mohammad Mannan, Paul C. van Oorschot
CSREAESA
2008
13 years 9 months ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra
CASES
2003
ACM
14 years 21 days ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
EEF
2000
13 years 11 months ago
Process Algebra and Markov Chains
This paper surveys and relates the basic concepts of process algebra and the modelling of continuous time Markov chains. It provides
Ed Brinksma, Holger Hermanns
COMSUR
2000
202views more  COMSUR 2000»
13 years 7 months ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman