[go: up one dir, main page]

Trček, 2000 - Google Patents

Security policy conceptual modeling and formalization for networked information systems

Trček, 2000

Document ID
12349193897119154650
Author
Trček D
Publication year
Publication venue
Computer communications

External Links

Snippet

Security in networked information systems is a very complex task that ranges from the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. All this is comprised in a so-called security policy, which is often treated as an …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Gritzalis et al. Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
JP5235252B2 (en) Method and apparatus for computed relevance messages
Van Lamsweerde et al. From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering
Trèek An integral framework for information systems security management
Moffett et al. Core security requirements artefacts
CN101785243A (en) Transferable restricted security tokens
Kim et al. Threat scenario‐based security risk analysis using use case modeling in information systems
Engström et al. Automated security assessments of amazon web services environments
Heyman et al. Reusable formal models for secure software architectures
Lang et al. Developing secure distributed systems with CORBA
Trček Security policy conceptual modeling and formalization for networked information systems
Zhang et al. A pentagon of considerations towards more secure blockchains
Vivas et al. Towards a business process-driven framework for security engineering with the UML
Reichert et al. Software supply chain security: a systematic literature review
Thomas et al. Interpreting deep structures of information systems security
Ali et al. Human-technology centric in cyber security maintenance for digital transformation era
Kyamakya et al. Security and survivability of distributed systems: an overview
Chivers et al. Risk profiles and distributed risk assessment
Trcek Security policy management for networked information systems
Karjoth et al. Mobile agents and telcos’ nightmares
Beji et al. Security ontology proposal for mobile applications
Tettero et al. Information security embedded in the design of telematics systems
Hutter et al. Security of multi-agent systems: A case study on comparison shopping
Sion Automated threat analysis for security and privacy
Sadi Assisting with API design through reusing design knowledge