Sciweavers

5475 search results - page 156 / 1095
» Model Driven Security
Sort
View
CCS
2007
ACM
15 years 9 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
ICCAD
1994
IEEE
131views Hardware» more  ICCAD 1994»
15 years 7 months ago
Edge-map: optimal performance driven technology mapping for iterative LUT based FPGA designs
We consider the problem of performance driven lookup-table (LUT) based technology mapping for FPGAs using a general delay model. In the general delay model, each interconnection e...
Hannah Honghua Yang, D. F. Wong
127
Voted
FOSAD
2000
Springer
15 years 7 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
ESORICS
1994
Springer
15 years 7 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
IJISEC
2006
88views more  IJISEC 2006»
15 years 3 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...