In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer com...
The last years have seen a number of proposals to incorporate Security Engineering into mainstream S...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
Historically, various different notions of trust can be found, each addressing particular aspects of...
Trust is an absolute necessity for digital communications; but is often viewed as an implicit singul...
Trust management is an important issue in the analysis and design of secure information systems. Thi...
Abstract—In this paper, we propose a method by which frontline engineers in system development field...
Trust is the main concern in securing web applications and it has to be implemented in every layer o...
In this paper, we consider the analysis and modelling of trust in distributed information systems. W...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer com...
International audienceIn this paper we present a logical model of trust in which trust is conceived ...
Computer security is an important issue in determining the dependability of computer systems. It bec...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
It is now commonly accepted that security and dependability largely represent two different aspects ...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer com...
The last years have seen a number of proposals to incorporate Security Engineering into mainstream S...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
Historically, various different notions of trust can be found, each addressing particular aspects of...
Trust is an absolute necessity for digital communications; but is often viewed as an implicit singul...
Trust management is an important issue in the analysis and design of secure information systems. Thi...
Abstract—In this paper, we propose a method by which frontline engineers in system development field...
Trust is the main concern in securing web applications and it has to be implemented in every layer o...
In this paper, we consider the analysis and modelling of trust in distributed information systems. W...
Part 1: Invited PaperInternational audienceThe computer security community has traditionally regarde...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer com...
International audienceIn this paper we present a logical model of trust in which trust is conceived ...
Computer security is an important issue in determining the dependability of computer systems. It bec...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
It is now commonly accepted that security and dependability largely represent two different aspects ...
Due to the widespread trust threat under the open and dynamic Internet environment, the computer com...
The last years have seen a number of proposals to incorporate Security Engineering into mainstream S...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...