Sciweavers

410 search results - page 26 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
WOA
2001
13 years 9 months ago
Multi-User and Security Support for Multi-Agent Systems
This paper discusses the requirements an agent system needs to be secure. In particular, the paper introduces a classification of modern distributed systems, and examines the dele...
Agostino Poggi, Giovanni Rimassa, Michele Tomaiuol...
EUROCRYPT
2003
Springer
14 years 26 days ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
USS
2008
13 years 10 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
RE
2007
Springer
14 years 1 months ago
Scenarios: Identifying Missing Objects and Actions by Means of Computational Linguistics
In industrial requirements documents natural language is the main presentation means. In such documents, system behavior is specified in the form of scenarios, written as a seque...
Leonid Kof