Sciweavers

3811 search results - page 84 / 763
» The Safe-Tcl Security Model
Sort
View
ISSE
2010
14 years 10 months ago
An integrated multi-view model evolution framework
A UML model of a software system can be represented by a sequence of model transformations, starting from an empty model. To effectively support the design of complex systems, tra...
Volker Stolz
IWSEC
2007
Springer
15 years 6 months ago
Processing Multi-parameter Attacktrees with Estimated Parameter Values
Abstract. Authors extend the multi-parameter attacktree model to include inaccurate or estimated parameter values, which are modelled as probabilistic interval estimations. The pap...
Aivo Jürgenson, Jan Willemson
ACNS
2006
Springer
112views Cryptology» more  ACNS 2006»
15 years 5 months ago
Password Based Server Aided Key Exchange
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient t...
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
15 years 5 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
SAINT
2006
IEEE
15 years 6 months ago
A Prototype of a Secure Autonomous Bootstrap Mechanism for Control Networks
There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automatio...
Nobuo Okabe, Shoichi Sakane, Masahiro Ishiyama, At...