Sciweavers

52 search results - page 5 / 11
» Tools for model-based security engineering: models vs. code
Sort
View
CSSE
2008
IEEE
14 years 2 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
14 years 8 months ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
IEEEARES
2007
IEEE
14 years 1 months ago
Models for automatic generation of safety-critical real-time systems
Model-based development has become state of the art in software engineering. A number of tools, like Matlab/Simulink or SCADE, are available for the automatic generation of applic...
Christian Buckl, Matthias Regensburger, Alois Knol...
MODELS
2007
Springer
14 years 1 months ago
Model Driven Development of Complex User Interface
To promote the Model-Based software engineering development of user interfaces, this paper proposes a model driven development approach of complex user interface. The approach cap...
Xudong Lu, Jiancheng Wan
WWW
2010
ACM
14 years 2 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner