Sciweavers

1407 search results - page 4 / 282
» Systems Theory Model for Information Security
Sort
View
CCS
2005
ACM
13 years 11 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
ACSAC
1999
IEEE
13 years 9 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
RP
2009
Springer
121views Control Systems» more  RP 2009»
13 years 12 months ago
Games with Opacity Condition
We describe the class of games with opacity condition, as an adequate model for security aspects of computing systems. We study their theoretical properties, relate them to reachab...
Bastien Maubert, Sophie Pinchinat
IJBIS
2010
123views more  IJBIS 2010»
13 years 2 months ago
Designing information systems requirements in context: insights from the theory of deferred action
This paper considers conceptual and contextual issues relating to the problem of developing systems models capable of representing knowable and unknowable information requirements...
Nandish V. Patel, Ray Hackney
CCS
2004
ACM
13 years 10 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li