Formal Techniques for Information and Software Security: An Annotated Bibliography
نویسندگان
چکیده
This report is the result of an extensive literature survey performed by its authors. Our goal is to provide an overview of existing formal approaches to information and software security. A rough classification of the topics covered in the research literature and brief descriptions of these topics should help the reader find his or her way in the substantial body of research.
منابع مشابه
The annotated bibliography and citation behavior: enhancing student scholarship in an undergraduate biology course.
Contemporary undergraduates in the biological sciences have unprecedented access to scientific information. Although many of these students may be savvy technologists, studies from the field of library and information science consistently show that undergraduates often struggle to locate, evaluate, and use high-quality, reputable sources of information. This study demonstrates the efficacy and ...
متن کاملSafety-Critical Software: Status Report and Annotated Bibliography
Many systems are deemed safety-critical and these systems are increasingly dependent on software. Much has been written In the literature with respect to system and software safety. This repo~l sum;-,;A& .es some of that literature and outlines the development of saf,. criticai zcw,vare. Techniques for hazard identification and analysis are discussed. 'Further, techniques for the development of...
متن کاملHoc Sensor Networks for Port Security Final Report
i Disclaimer The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the Transportation assume no liability for the contents or use thereof. The contents do not necessarily reflect the official views or policies of the State of California or the De...
متن کاملAnnotated Z bibliography
1 Introduction This annotated Z bibliography contains a selected list of some pertinent publications for Z users. Most of those included are readily available, either as books or in journals. A few unpublished items have been included, where they are particularly relevant and can be obtained reasonably easily. Some references are accompanied by an annotation. This may include a contents list (o...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005