Sciweavers

1587 search results - page 26 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 4 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
EDCC
1994
Springer
15 years 6 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
HCSE
2010
15 years 13 days ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
15 years 14 days ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
SECURWARE
2007
IEEE
15 years 8 months ago
Temporal Verification in Secure Group Communication System Design
The paper discusses an experience in using a realtime UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirement...
Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes...