Sciweavers

2281 search results - page 14 / 457
» Security Patterns and Secure Systems Design
Sort
View
EDOC
2007
IEEE
14 years 2 months ago
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
Peter F. Linington, Pulitha Liyanagama
CDC
2009
IEEE
14 years 1 months ago
Ordinal optimization based security dispatching in deregulated power systems
— Due to the uncertainty in the forecasting of load patterns, security dispatching finds the generation pattern, which is the most economic and passes all N − 1 contingencies ...
Qing-Shan Jia, Min Xie, Felix F. Wu
TGC
2007
Springer
14 years 2 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou
ISSE
2006
13 years 8 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
JCS
2011
156views more  JCS 2011»
13 years 3 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran