Sciweavers

3811 search results - page 14 / 763
» The Safe-Tcl Security Model
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 5 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 6 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
ISSE
2010
14 years 10 months ago
Towards model checking executable UML specifications in mCRL2
Helle Hvid Hansen, Jeroen Ketema, Bas Luttik, Moha...
CEEMAS
2005
Springer
15 years 5 months ago
SECMAP: A Secure Mobile Agent Platform
This paper describes a mobile agent platform, Secure Mobile Agent Platform (SECMAP), and its security infrastructure. Unlike other agent systems, SECMAP proposes a new agent model,...
Suat Ugurlu, Nadia Erdogan