Sciweavers

1875 search results - page 201 / 375
» Modeling the Security of Steganographic Systems
Sort
View
90
Voted
ICDCS
2005
IEEE
15 years 6 months ago
Equational Approach to Formal Analysis of TLS
TLS has been formally analyzed with the OTS/CafeOBJ method. In the method, distributed systems are modeled as transition systems, which are written in terms of equations, and it i...
Kazuhiro Ogata, Kokichi Futatsugi
EMS
2008
IEEE
15 years 2 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
88
Voted
CALCO
2007
Springer
118views Mathematics» more  CALCO 2007»
15 years 6 months ago
Coalgebraic Epistemic Update Without Change of Model
Abstract. We present a coalgebraic semantics for reasoning about information update in multi-agent systems. The novelty is that we have one structure for both states and actions an...
Corina Cîrstea, Mehrnoosh Sadrzadeh
ACSAC
2004
IEEE
15 years 4 months ago
Role-Based Delegation Model/ Hierarchical Roles (RBDM1)
The basic idea behind delegation is that some active entity in a system delegates authority to another active entity in order to carry out some functions on behalf of the former. ...
Ezedin Barka, Ravi S. Sandhu
98
Voted
HPDC
1996
IEEE
15 years 4 months ago
The Core Legion Object Model
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...
Michael J. Lewis, Andrew S. Grimshaw