Sciweavers

674 search results - page 21 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 9 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
ACSC
2010
IEEE
14 years 4 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown
EDOC
2003
IEEE
15 years 2 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
FTDCS
1997
IEEE
15 years 1 months ago
Analysing the behaviour of distributed software architectures: a case study
A Software Architecture is the overall structure of a system in terms of its constituent components and their interconnections. In this paper, we describe work to associate behavi...
Jeff Magee, Jeff Kramer, Dimitra Giannakopoulou
VTS
2007
IEEE
116views Hardware» more  VTS 2007»
15 years 3 months ago
Case Study: Soft Error Rate Analysis in Storage Systems
Soft errors due to cosmic particles are a growing reliability threat for VLSI systems. In this paper we analyze the soft error vulnerability of FPGAs used in storage systems. Sinc...
Brian Mullins, Hossein Asadi, Mehdi Baradaran Taho...