نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

2006
Howard Robert Chivers

Risk has always motivated security in general terms; both assurance and IT governance approaches to security begin with a focus on risk, but the connection between risk and technical security is soon lost. As a result it is usually impossible to quantify the value of security features, or give metrics for the value of a security design compared to alternatives. This thesis describes the Securit...

1999
Nancy A. DURGIN John C. MITCHELL

Several approaches have been developed for analyzing security protocols. Most formal approaches are based on a set of assumptions commonly referred to as the “Dolev-Yao model.” In this paper, we use a formalism based on multiset rewriting to describe these modeling assumptions and explain how they are used in protocol analysis. The unifying formalism makes it possible to discuss general optimiz...

Journal: :IEEE Security & Privacy 2004
Brian Chess Gary McGraw

source-code security analysis with static analysis tools. Since ITS4's release in early 2000 (www.cigital.com/its4/), the idea of detecting security problems through source code has come of age. ITS4 is extremely simple—the tool basically scans through a file looking for syntactic matches based on several simple " rules " that might indicate possible security vulnera-bilities (for example, use ...

2014
Christian Pitscheider

Computer network security is the first line of defence to accomplish information assurance. The computer network is at risk without a well-designed and flawless implemented network security policy. The main problem is that network administrators are not able to verify the network security policy. Although further research has been carried out, it mainly concerns small specific parts of the over...

2005
Graham Steel

This note describes previously completed and ongoing research in the MRG in the area of security protocol analysis.

2010
Pavol Sovis Florian Kohlar Jörg Schwenk

OpenID is a user-centric and decentralized Single Sign-On system. It enables users to sign into Relying Partiesby providing an authentication assertion from an OpenID Provider. It is supported by many leading internet companies and there are over a billion accounts capable of using OpenID. We present a security analysis of OpenID and the corresponding extensions and reveal several vulnerabiliti...

Journal: :فصلنامه رفاه اجتماعی 0
مهدی تقوی mehdi taghavi

globalization effects on social security systems and on social expenditures in different countries will be analyzed in this chapter. our consentration is yet on anglo-saxon countries . but it is assumed that many offer countries are under the same pressure of globalization on their social security expenses as the anglo-saxon countries . this will be examined later in another chapter. in previou...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده حقوق 1388

چکیده ندارد.

Journal: :international journal of environmental research 2014
c. shao y. guan c. chu r. shi m. ju

the “driving force - pressure - state - impact – response” modeling framework isadopted to consider the formation mechanisms of environmental risks and the requirements ofecological environment protection. moreover, a systematical index system and evaluation model forthe measurement of the coastal ecological security level is put forward in this paper to assess thestate of coastal ecological en...

Journal: :جغرافیای سیاسی 0
علی اصغر پیله ور رضا رضائی خبوشان

extended abstract 1. introduction security is the most important factor for improving of a city and it’s the initial needs of human. security and developing are mutual relationship that derived from planning and city management. insecurity feeling in the urban area, the activities of human have been eclipsed and economic, cultural, social acts couldn’t be done easily .however security is necess...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید