Sciweavers

2270 search results - page 98 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ADBIS
2008
Springer
90views Database» more  ADBIS 2008»
13 years 10 months ago
An Advanced Transaction Model for Recovery Processing of Integration Processes
Integration processes are increasingly used in order to integrate distributed and heterogeneous systems. Although transactional behavior of workflows has been discussed extensively...
Matthias Böhm, Dirk Habich, Wolfgang Lehner, ...
FC
2009
Springer
135views Cryptology» more  FC 2009»
14 years 3 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
COMPSAC
2008
IEEE
14 years 3 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
BIBM
2007
IEEE
159views Bioinformatics» more  BIBM 2007»
14 years 3 months ago
Predicting Future High-Cost Patients: A Real-World Risk Modeling Application
Health care data from patients in the Arizona Health Care Cost Containment System, Arizona’s Medicaid program, provides a unique opportunity to exploit state-of-the-art data pro...
Sai T. Moturu, William G. Johnson, Huan Liu
ICSE
2004
IEEE-ACM
14 years 9 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde