Sciweavers

193 search results - page 13 / 39
» An Aspect-Oriented Approach to Security Requirements Analysi...
Sort
View
BCS
2008
15 years 1 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
WISA
2005
Springer
15 years 5 months ago
DPA Attack on the Improved Ha-Moon Algorithm
Abstract. The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a r...
Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
IFIP
2010
Springer
14 years 6 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
IEEEARES
2007
IEEE
15 years 6 months ago
Pastures: Towards Usable Security Policy Engineering
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...
EUROPKI
2005
Springer
15 years 5 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl