Sciweavers

1407 search results - page 55 / 282
» Systems Theory Model for Information Security
Sort
View
118
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
126
Voted
GECCO
2007
Springer
187views Optimization» more  GECCO 2007»
15 years 10 months ago
Agent-environment interaction in a multi-agent system: a formal model
In this paper, we introduce a formal-language model for explicitly formalizing agent-environment interaction in a multiagent systems (MAS) framework: Conversational Grammar System...
Gemma Bel Enguix, Maria Dolores Jiménez-L&o...
112
Voted
WWW
2005
ACM
15 years 9 months ago
Improved timing control for web server systems using internal state information
How to effectively allocate system resource to meet the Service Level Agreement (SLA) of Web servers is a challenging problem. In this paper, we propose an improved scheme for aut...
Xue Liu, Rong Zheng, Jin Heo, Lui Sha
106
Voted
ICPADS
2006
IEEE
15 years 9 months ago
Experiences with Simulations - A Light and Fast Model for Secure Web Applications
Using simulations of a complex system such as a Web Application Server provides us with a tool that allows the running of tests without using the resources needed in a real system...
Ramon Nou, Jordi Guitart, David Carrera, Jordi Tor...
155
Voted
REFSQ
2010
Springer
15 years 5 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...