Sciweavers

7 search results - page 1 / 2
» Model-Based Design and Analysis of Permission-Based Security
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
13 years 11 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
FASE
2008
Springer
13 years 7 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
13 years 12 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
13 years 12 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
14 years 19 hour ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...