Sciweavers

674 search results - page 11 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ICDCIT
2005
Springer
15 years 3 months ago
Validation of Policy Integration Using Alloy
Abstract. Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired...
Manachai Toahchoodee, Indrakshi Ray
CCS
2008
ACM
14 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CASES
2003
ACM
15 years 2 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
JAR
2008
115views more  JAR 2008»
14 years 9 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
ASE
2007
121views more  ASE 2007»
14 years 9 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone