Sciweavers

14850 search results - page 1 / 2970
» The Security of
Sort
View
CSFW
1999
IEEE
13 years 9 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 8 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
SP
2000
IEEE
13 years 9 months ago
Will Openish Source Really Improve Security
Will openish source really improve security? No.
Gary McGraw