Sciweavers

2043 search results - page 67 / 409
» Reasoning About Security Models
Sort
View
CORR
2008
Springer
151views Education» more  CORR 2008»
13 years 10 months ago
Checking the Quality of Clinical Guidelines using Automated Reasoning Tools
Requirements about the quality of clinical guidelines can be represented by schemata borrowed from the theory of abductive diagnosis, using temporal logic to model the time-orient...
Arjen Hommersom, Peter J. F. Lucas, Patrick van Bo...
COORDINATION
2008
Springer
14 years 4 days ago
Formal Analysis of BPMN Via a Translation into COWS
A translation of the Business Process Modeling Notation into the process calculus COWS is presented. The stochastic extension of COWS is then exploited to address quantitative reas...
Davide Prandi, Paola Quaglia, Nicola Zannone
WSC
2004
13 years 11 months ago
A Template-Based Conceptual Modeling Infrastructure for Simulation of Physical Security Systems
Although simulation is one of the most innovative and cost-effective tools for modeling and analyzing a system, simulation studies often fail to provide any useful results. One re...
Ashu Guru, Paul A. Savory
CCS
1999
ACM
14 years 2 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
RE
2005
Springer
14 years 3 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...