Sciweavers

5475 search results - page 170 / 1095
» Model Driven Security
Sort
View
147
Voted
COMPSEC
2010
146views more  COMPSEC 2010»
15 years 3 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
110
Voted
NSPW
2006
ACM
15 years 9 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
DAGSTUHL
2004
15 years 4 months ago
Refinement and Consistency in Multiview Models
Abstract. Model transformations are an integral part of OMG's standard for Model Driven Architecture (MDA). Model transformations should at the best allow for a seamless trans...
Heike Wehrheim
IEEESCC
2010
IEEE
15 years 5 months ago
SecureSOA
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide...
Michael Menzel, Christoph Meinel
190
Voted
ICDAR
2007
IEEE
15 years 9 months ago
Handwritten Word Recognition Using Conditional Random Fields
The paper describes a lexicon driven approach for word recognition on handwritten documents using Conditional Random Fields(CRFs). CRFs are discriminative models and do not make a...
Shravya Shetty, Harish Srinivasan, Sargur N. Sriha...