In this paper, we discuss the use of formal requirementsengineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to repr...
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Bri...
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...