Sciweavers

2004 search results - page 80 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
IFIP
2007
Springer
15 years 6 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
ECIS
2001
15 years 1 months ago
Design of Web-Based Information Systems - New Challenges for Systems Development?
The web-technology is going through major changes these years, both with respect to types of systems based on web-technology, organization of the development work, required approa...
Peter H. Carstensen, Lasse Vogelsang
CSFW
2000
IEEE
15 years 4 months ago
Information Flow Analysis in a Discrete-Time Process Algebra
Some of the non interference properties studied in [4, 6, 18] for information flow analysis in computer systems, notably Æ , are reformulated here in a realtime setting. This is...
Riccardo Focardi, Roberto Gorrieri, Fabio Martinel...
HPDC
2010
IEEE
15 years 29 days ago
Comparison of resource platform selection approaches for scientific workflows
Cloud computing is increasingly considered as an additional computational resource platform for scientific workflows. The cloud offers opportunity to scale-out applications from d...
Yogesh L. Simmhan, Lavanya Ramakrishnan
NOMS
2002
IEEE
131views Communications» more  NOMS 2002»
15 years 4 months ago
Tools for domain-based policy management of distributed systems
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...