Sciweavers

3811 search results - page 7 / 763
» The Safe-Tcl Security Model
Sort
View
93
Voted
SECRYPT
2010
147views Business» more  SECRYPT 2010»
14 years 7 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...
70
Voted
IEEEARES
2009
IEEE
15 years 4 months ago
An Architectural Foundation for Security Model Sharing and Reuse
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
Per Håkon Meland, Shanai Ardi, Jostein Jense...
97
Voted
ASIASIM
2004
Springer
15 years 2 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
OOPSLA
2009
Springer
15 years 4 months ago
The 9th OOPSLA workshop on domain-specific modeling
Juha-Pekka Tolvanen, Jeff Gray, Matti Rossi, Jonat...