peer reviewedE-government services usually process large amounts of confidential data, but simultaneously they shall provide simple and userfriendly graphical interfaces. Therefore, security requirements for the communication between components have to be adhered in a very strict way. Hence it is of main interest that developers can analyze their modularized models of actual systems and that they can detect critical patterns. For this purpose, we present a general and formal framework for critical pattern detection and user-driven correction as well as possibilities for automatic analysis and verification of security requirements on the meta model level. The technique is based on the formal theory of graph transformation, which we extend to...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
E-government services usually process large amounts of confidential data, but simultaneously they sh...
E-government services usually process large amounts of confidential data. Therefore, security requir...
The verification of systems with respect to a desired set of behavioural properties is a crucial ste...
One of the best ways to protect an organization’s assets is to implement security requirements...
This work presents the use of graph-based approaches to discovering anomalous instances of structura...
This thesis presents a new approach to modelling the security and integrity of data in distributed a...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
The premise of automated alert correlation is to accept that false alerts from a low level intrusion...
AbstractWe describe a type system for the Xdπ calculus of Gardner and Maffeis. An Xdπ-network is a n...
AbstractInheritance is an important and widely spread concept enabling the elegant expression of hie...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
E-government services usually process large amounts of confidential data, but simultaneously they sh...
E-government services usually process large amounts of confidential data. Therefore, security requir...
The verification of systems with respect to a desired set of behavioural properties is a crucial ste...
One of the best ways to protect an organization’s assets is to implement security requirements...
This work presents the use of graph-based approaches to discovering anomalous instances of structura...
This thesis presents a new approach to modelling the security and integrity of data in distributed a...
AbstractAn integral part of modeling the global view of network security is constructing attack grap...
The premise of automated alert correlation is to accept that false alerts from a low level intrusion...
AbstractWe describe a type system for the Xdπ calculus of Gardner and Maffeis. An Xdπ-network is a n...
AbstractInheritance is an important and widely spread concept enabling the elegant expression of hie...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of...
This paper describes way how to use graph theory in security analysis. As an environment is used net...