Trček, 2000 - Google Patents
Security policy conceptual modeling and formalization for networked information systemsTrček, 2000
- Document ID
- 12349193897119154650
- Author
- Trček D
- Publication year
- Publication venue
- Computer communications
External Links
Snippet
Security in networked information systems is a very complex task that ranges from the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. All this is comprised in a so-called security policy, which is often treated as an …
- 238000000034 method 0 abstract description 38
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gritzalis et al. | Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification | |
JP5235252B2 (en) | Method and apparatus for computed relevance messages | |
Van Lamsweerde et al. | From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering | |
Trèek | An integral framework for information systems security management | |
Moffett et al. | Core security requirements artefacts | |
CN101785243A (en) | Transferable restricted security tokens | |
Kim et al. | Threat scenario‐based security risk analysis using use case modeling in information systems | |
Engström et al. | Automated security assessments of amazon web services environments | |
Heyman et al. | Reusable formal models for secure software architectures | |
Lang et al. | Developing secure distributed systems with CORBA | |
Trček | Security policy conceptual modeling and formalization for networked information systems | |
Zhang et al. | A pentagon of considerations towards more secure blockchains | |
Vivas et al. | Towards a business process-driven framework for security engineering with the UML | |
Reichert et al. | Software supply chain security: a systematic literature review | |
Thomas et al. | Interpreting deep structures of information systems security | |
Ali et al. | Human-technology centric in cyber security maintenance for digital transformation era | |
Kyamakya et al. | Security and survivability of distributed systems: an overview | |
Chivers et al. | Risk profiles and distributed risk assessment | |
Trcek | Security policy management for networked information systems | |
Karjoth et al. | Mobile agents and telcos’ nightmares | |
Beji et al. | Security ontology proposal for mobile applications | |
Tettero et al. | Information security embedded in the design of telematics systems | |
Hutter et al. | Security of multi-agent systems: A case study on comparison shopping | |
Sion | Automated threat analysis for security and privacy | |
Sadi | Assisting with API design through reusing design knowledge |