Sciweavers

1795 search results - page 145 / 359
» Security Models and Information Flow
Sort
View
134
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Architecting as decision making with patterns and primitives
The application of patterns is used as a foundation for many central design decisions in software architecture, but because of the informal nature of patterns, these design decisi...
Uwe Zdun, Paris Avgeriou, Carsten Hentrich, Schahr...
DAWAK
2008
Springer
15 years 5 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi
OSDI
2000
ACM
15 years 5 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
ATAL
2010
Springer
15 years 5 months ago
Robust Bayesian methods for Stackelberg security games
Recent work has applied game-theoretic models to real-world security problems at the Los Angeles International Airport (LAX) and Federal Air Marshals Service (FAMS). The analysis o...
Christopher Kiekintveld, Milind Tambe, Janusz Mare...
IEEEARES
2009
IEEE
15 years 10 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira