Sciweavers

178 search results - page 1 / 36
» A Formal Model for Network-Wide Security Analysis
Sort
View
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
13 years 11 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
CCS
2003
ACM
13 years 10 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
CRISIS
2008
13 years 6 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita
CCS
2010
ACM
13 years 5 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
CSFW
2011
IEEE
12 years 4 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...