نتایج جستجو برای: security model

تعداد نتایج: 2246841  

2004
Arend Rensink

Discussions about model-driven approaches tend to be hampered by terminological confusion. This is at least partially caused by a lack of formal precision in defining the basic concepts, including that of “model” and “thing being modelled” — which we call subject in this paper. We propose a minimal criterion that a model should fulfill: essentially, it should come equipped with a clear and unam...

2003
Sascha Konrad Betty H.C. Cheng Laura A. Campbell Ronald Wassermann

Recently, there has been growing interest in identifying patterns for the domain of system security, termed security patterns. Currently, those patterns lack comprehensive structure that conveys essential information inherent to security engineering. This paper describes research into investigating an appropriate template for security patterns that is tailored to meet the needs of secure system...

2015
Jan Jürjens Amir Shayan Ahmadian

In this invited presentation, we give an overview on a soundly based approach to Secure Software Engineering based on the UML extension UMLsec. More specifically, one main current focus is the automated, formally based analysis of software artefacts against security requirements. This is motivated by the observation that the current state of security engineering in practice is far from satisfac...

Journal: :JOEUC 2014
Clay K. Williams Donald E. Wynn Ramana Madupalli Elena Karahanna Barbara K. Duncan

Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is...

Journal: :Annales UMCS, Informatica 2009
Pawel Szalachowski Bogdan Ksiezopolski Zbigniew Kotulski

Security protocols used in today’s communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods used during transporting the data between parti...

2016
Christian Wolter Michael Menzel Andreas Schaad Philip Miseldine Alessandro Armando Roberto Carbone Luca Compagna Keqin Li Muhammad Qaiser Saleem Jafreezal Jaafar Mohd Fadzil Hassan Wei She I-Ling Yen Bhavani Thuraisingham Li Jiang Hao Chen Fei Deng Robert Warschofsky

Nowadays, the services offered by the Service Providers are subjected to many risks in terms of privacy agreements and hence they are treated as untrustworthy. Security risk analysis is fundamental to the security of any business and it is considered to be very essential in ensuring that controls and expenditure are fully commensurate with the risks to which the business is

2011
M. Thirumaran P. Dhavachelvan S. Abarna

Nowadays, the services offered by the Service Providers are subjected to many risks in terms of privacy agreements and hence they are treated as untrustworthy. Security risk analysis is fundamental to the security of any business and it is considered to be very essential in ensuring that controls and expenditure are fully commensurate with the risks to which the business is exposed. Hence, the ...

2012
Sen-Tarng Lai

Software security has become an increasingly important issue for information and software system. Secure vulnerabilities of software system may cause a company out of business and even destroy the social normal operation. How to improve software security becomes a critical issue in software development process. In this paper, utilizing the static program analyzer and dynamic simulation analyzer...

Journal: :Int. Arab J. Inf. Technol. 2006
Awad M. Awadelkarim Norbik Bashah Idris

This paper proposes a universal architecture of Security Management Model (SMM) for integrating security features namely low-level access control at row and column level of relational legacy databases using XML as an integration medium. The proposed model integrates and then rearranges, controls, and manages the new and inherent low-level access control attributes based on Rule-Based Algorithm ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید