Sciweavers

3811 search results - page 9 / 763
» The Safe-Tcl Security Model
Sort
View
77
Voted
ISSE
2010
15 years 10 days ago
Generating heterogeneous executable specifications in SystemC from UML/MARTE models
Pablo Peñil, J. Medina, Hector Posadas, Eug...
100
Voted
PAISI
2010
Springer
15 years 9 days ago
An Association Model for Implicit Crime Link Analysis
Jau-Hwang Wang, Chien-Lung Lin
107
Voted
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
SICHERHEIT
2010
14 years 11 months ago
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
CCS
2009
ACM
16 years 2 months ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart