Sciweavers

106 search results - page 9 / 22
» Tools for Traceable Security Verification
Sort
View
JUCS
2010
130views more  JUCS 2010»
13 years 2 months ago
Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models
: There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) t...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
13 years 5 months ago
Fingerprint and On-Line Signature Verification Competitions at ICB 2009
This paper describes the objectives, the tasks proposed to the participants and the associated protocols in terms of database and assessment tools of two present competitions on fi...
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferr...
DAGSTUHL
2006
13 years 9 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
CAISE
2006
Springer
13 years 9 months ago
An attempt to combine UML and formal methods to model airport security
The EDEMOI project aims to model standards that regulate airport security. It involves the production of a UML model, to support the validation activity, and a formal model for ver...
Yves Ledru, Régine Laleau, Michel Lemoine, ...