Sciweavers

674 search results - page 44 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
JUCS
2000
119views more  JUCS 2000»
14 years 9 months ago
Use of E-LOTOS in Adding Formality to UML
: E-LOTOS, a new version of the ISO standard specification language LOTOS, is currently being developed. We describe how it can be used to give a formal meaning to, and to discover...
Robert G. Clark, Ana M. D. Moreira
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
BCS
2008
14 years 11 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ECMDAFA
2009
Springer
170views Hardware» more  ECMDAFA 2009»
15 years 4 months ago
A Model Driven Approach to the Analysis of Timeliness Properties
The need for a design language that is rigorous but accessible and intuitive is often at odds with the formal and mathematical nature of languages used for analysis. UML and Petri ...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
BMCBI
2011
14 years 1 months ago
Fusion of metabolomics and proteomics data for biomarkers discovery: case study on the experimental autoimmune encephalomyelitis
Background: Analysis of Cerebrospinal Fluid (CSF) samples holds great promise to diagnose neurological pathologies and gain insight into the molecular background of these patholog...
Lionel Blanchet, Agnieszka Smolinska, Amos Attali,...