Formal Techniques for Information and Software Security: An Annotated Bibliography

نویسندگان

  • Bart De Win
  • Bart Jacobs
  • Wouter Joosen
  • Gregory Neven
  • Frank Piessens
  • Tine Verhanneman
چکیده

This report is the result of an extensive literature survey performed by its authors. Our goal is to provide an overview of existing formal approaches to information and software security. A rough classification of the topics covered in the research literature and brief descriptions of these topics should help the reader find his or her way in the substantial body of research.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The annotated bibliography and citation behavior: enhancing student scholarship in an undergraduate biology course.

Contemporary undergraduates in the biological sciences have unprecedented access to scientific information. Although many of these students may be savvy technologists, studies from the field of library and information science consistently show that undergraduates often struggle to locate, evaluate, and use high-quality, reputable sources of information. This study demonstrates the efficacy and ...

متن کامل

Safety-Critical Software: Status Report and Annotated Bibliography

Many systems are deemed safety-critical and these systems are increasingly dependent on software. Much has been written In the literature with respect to system and software safety. This repo~l sum;-,;A& .es some of that literature and outlines the development of saf,. criticai zcw,vare. Techniques for hazard identification and analysis are discussed. 'Further, techniques for the development of...

متن کامل

Hoc Sensor Networks for Port Security Final Report

i Disclaimer The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the Transportation assume no liability for the contents or use thereof. The contents do not necessarily reflect the official views or policies of the State of California or the De...

متن کامل

Annotated Z bibliography

1 Introduction This annotated Z bibliography contains a selected list of some pertinent publications for Z users. Most of those included are readily available, either as books or in journals. A few unpublished items have been included, where they are particularly relevant and can be obtained reasonably easily. Some references are accompanied by an annotation. This may include a contents list (o...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005