Sciweavers

2270 search results - page 6 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
PST
2004
14 years 10 months ago
Secure Public Instant Messaging
We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in l...
Mohammad Mannan, Paul C. van Oorschot
77
Voted
CSREAESA
2008
14 years 11 months ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra
CASES
2003
ACM
15 years 2 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
84
Voted
EEF
2000
15 years 1 months ago
Process Algebra and Markov Chains
This paper surveys and relates the basic concepts of process algebra and the modelling of continuous time Markov chains. It provides
Ed Brinksma, Holger Hermanns
73
Voted
COMSUR
2000
202views more  COMSUR 2000»
14 years 9 months ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman