Sciweavers

2178 search results - page 35 / 436
» Toward Systemically Secure IT Architectures
Sort
View
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
ECSA
2008
Springer
15 years 5 months ago
Towards a Method for the Evaluation of Reference Architectures: Experiences from a Case
Reference architectures provide major guidelines for the structure of a class of information systems. Because of their fundamental role, reference architectures have to be of high ...
Samuil Angelov, Jos J. M. Trienekens, Paul W. P. J...
IEEEARES
2006
IEEE
15 years 9 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
171
Voted
SACMAT
2009
ACM
15 years 9 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
122
Voted
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 10 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...