Sciweavers

410 search results - page 32 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
SAFECOMP
2007
Springer
14 years 1 months ago
Improving Test Coverage for UML State Machines Using Transition Instrumentation
We discuss the problem of generating test suites from UML state machines and present a method to extend the capabilities of existing automated test case generators. Current tools p...
Mario Friske, Bernd-Holger Schlingloff
ICST
2008
IEEE
14 years 2 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
JAR
2008
115views more  JAR 2008»
13 years 7 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
AC
2003
Springer
14 years 27 days ago
Application of Coloured Petri Nets in System Development
Coloured Petri Nets (CP-nets or CPNs) and their supporting computer tools have been used in a wide range of application areas such as communication protocols, software designs, and...
Lars Michael Kristensen, Jens Bæk Jør...
IEEEARES
2010
IEEE
13 years 12 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser