FORMAL MODELS FOR COMPUTER SECURITY

被引:14
|
作者
LANDWEHR, CE
机构
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:247 / 278
页数:32
相关论文
共 50 条
  • [21] The Effect of Entertainment Media on Mental Models of Computer Security
    Fulton, Kelsey R.
    Gelles, Rebecca
    McKay, Alexandra
    Roberts, Richard
    Abdi, Yasmin
    Mazurek, Michelle L.
    PROCEEDINGS OF THE FIFTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2019), 2019, : 79 - 95
  • [22] FORMAL FET MODELS AND COMPUTER-PROGRAMS FOR PARAMETER-IDENTIFICATION
    ARTYOMENKOV, AV
    IZVESTIYA VYSSHIKH UCHEBNYKH ZAVEDENII RADIOELEKTRONIKA, 1987, 30 (06): : 57 - 63
  • [23] Formal models, social theory and computer simulations:: Some methodical reflections
    Klüver, J
    Stoica, C
    Schmidt, J
    JASSS-THE JOURNAL OF ARTIFICIAL SOCIETIES AND SOCIAL SIMULATION, 2003, 6 (02):
  • [24] String distances and intrusion detection: Bridging the gap between formal languages and computer security
    Bruschi, Danilo
    Pighizzini, Giovanni
    RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2006, 40 (02): : 303 - 313
  • [25] Soundness conditions for cryptographic algorithms and parameters abstractions in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 31 - 38
  • [26] Computationally Secure Multiple Secret Sharing: Models, Schemes, and Formal Security Analysis
    Mashhadi, Samaneh
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 7 (02): : 91 - 99
  • [27] A Survey of Quantitative Security Risk Analysis Models for Computer Systems
    Meriah, Ines
    Rabai, Latifa Ben Arfa
    2018 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ARTIFICIAL INTELLIGENCE (ICAAI 2018), 2015, : 36 - 40
  • [28] Computer science with security; security with computer science
    Die Vorstandsperspektive
    Liggesmeyer, P. (peter.liggesmeyer@gi.de), 1600, Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany (36):
  • [29] Application of the formal model for describing processes of adaptive information security in computer-aided systems
    Nesteruk, F. G.
    Nesteruk, L. G.
    Nesteruk, G. F.
    AUTOMATION AND REMOTE CONTROL, 2009, 70 (03) : 491 - 501
  • [30] Application of the formal model for describing processes of adaptive information security in computer-aided systems
    F. G. Nesteruk
    L. G. Nesteruk
    G. F. Nesteruk
    Automation and Remote Control, 2009, 70 : 491 - 501