Sciweavers

Share
CCS   2006 Conference on Computer and Communications Security
Wall of Fame | Most Viewed CCS-2006 Paper
CCS
2006
ACM
9 years 3 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source480
2Download preprint from source233
3Download preprint from source213
4Download preprint from source210
5Download preprint from source191
6Download preprint from source189
7Download preprint from source182
8Download preprint from source182
9Download preprint from source172
10Download preprint from source171
11Download preprint from source169
12Download preprint from source166
13Download preprint from source164
14Download preprint from source161
15Download preprint from source159
16Download preprint from source158
17Download preprint from source155
18Download preprint from source154
19Download preprint from source154
20Download preprint from source149
21Download preprint from source149
22Download preprint from source147
23Download preprint from source146
24Download preprint from source134
25Download preprint from source133
26Download preprint from source133
27Download preprint from source132
28Download preprint from source132
29Download preprint from source128
30Download preprint from source128
31Download preprint from source126
32Download preprint from source125
33Download preprint from source124
34Download preprint from source123
35Download preprint from source122
36Download preprint from source120
37Download preprint from source118
38Download preprint from source117
39Download preprint from source117
40Download preprint from source117
41Download preprint from source116
42Download preprint from source116
43Download preprint from source116
44Download preprint from source116
45Download preprint from source116
46Download preprint from source115
47Download preprint from source115
48Download preprint from source114
49Download preprint from source114
50Download preprint from source113
51Download preprint from source112
52Download preprint from source112
53Download preprint from source111
54Download preprint from source110
55Download preprint from source109
56Download preprint from source108
57Download preprint from source108
58Download preprint from source107
59Download preprint from source106
60Download preprint from source105
61Download preprint from source105
62Download preprint from source105
63Download preprint from source105
64Download preprint from source104
65Download preprint from source103
66Download preprint from source103
67Download preprint from source103
68Download preprint from source102
69Download preprint from source101
70Download preprint from source101
71Download preprint from source99
72Download preprint from source99
73Download preprint from source99
74Download preprint from source97
75Download preprint from source93
76Download preprint from source91
77Download preprint from source90
books