Sciweavers

2270 search results - page 72 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
VOSS
2004
Springer
118views Mathematics» more  VOSS 2004»
14 years 2 months ago
Serial Disk-based Analysis of Large Stochastic Models
Abstract. The paper presents a survey of out-of-core methods available for the analysis of large Markov chains on single workstations. First, we discuss the main sparse matrix stor...
Rashid Mehmood
IFIP
2009
Springer
14 years 3 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
EOR
2007
104views more  EOR 2007»
13 years 8 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
SEKE
1992
Springer
14 years 25 days ago
An Iterative-Cyclic Software Process Model
The current state of traditional software development is surveyed and essential problems are investigated on the basis of system theoretical considerations. The concept of optimis...
Matthias Rauterberg
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 9 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...