Sciweavers

2043 search results - page 35 / 409
» Reasoning About Security Models
Sort
View
CSFW
2010
IEEE
14 years 2 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 3 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
AICOM
2007
119views more  AICOM 2007»
13 years 10 months ago
Using exogenous quantities in qualitative models about environmental sustainability
Representing the impact of external factors on the behaviour of a system is a challenge for modellers, particularly when these factors are dynamic and may change during the simulat...
Bert Bredeweg, Paulo Salles, Tim Nuttle
IJCSA
2007
88views more  IJCSA 2007»
13 years 10 months ago
A New Quantitative Trust Model for Negotiating Agents using Argumentation
In this paper, we propose a new quantitative trust model for argumentation-based negotiating agents. The purpose of such a model is to provide a secure environment for agent negot...
Jamal Bentahar, John-Jules Ch. Meyer
RE
2010
Springer
13 years 5 months ago
A UML-based static verification framework for security
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...
Igor Siveroni, Andrea Zisman, George Spanoudakis