A good way to obtain secure systems is to build applications in a systematic way where security is an integral part of the lifecycle. The same applies to reliability. If we want a system which is secure and reliable, both security and reliability must be built together. If we build not only applications but also middleware and operating systems in the same way, we can build systems that not only are inherently secure but also can withstand attacks from malicious applications and resist errors. In addition, all security and reliability constraints should be defined in the application level, where their semantics is understood and propagated to the lower levels. The lower levels provide the assurance that the constraints are being followed. I...
ii As computerized systems have become an important part of society and its infrastruc-ture, the nee...
Designing a secure software system requires the ability to represent and reason about a wide variety...
International audienceSeveral development approaches have been proposed to handle the growing comple...
We present a model-based approach using two dimensions to propagate security restrictions: along the...
Security analysis methods can provide correct yet meaningless results if the assumptions underlying ...
Security is definitely one of the most important aspects in business information systems. This aspec...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
We initiated an international collaboration between our security groups a few years ago, centered on...
It is now commonly accepted that security and dependability largely represent two different aspects ...
Security is the most important dimension to the systems that involves processing and interchange of ...
The requirement for higher quality and seamless development of systems is continuously increasing, e...
Designing security for a computer system is best done by utilizing a systematic engineering approach...
[[abstract]]Security system architecture governs the composition of components in security systems a...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
ii As computerized systems have become an important part of society and its infrastruc-ture, the nee...
Designing a secure software system requires the ability to represent and reason about a wide variety...
International audienceSeveral development approaches have been proposed to handle the growing comple...
We present a model-based approach using two dimensions to propagate security restrictions: along the...
Security analysis methods can provide correct yet meaningless results if the assumptions underlying ...
Security is definitely one of the most important aspects in business information systems. This aspec...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
We initiated an international collaboration between our security groups a few years ago, centered on...
It is now commonly accepted that security and dependability largely represent two different aspects ...
Security is the most important dimension to the systems that involves processing and interchange of ...
The requirement for higher quality and seamless development of systems is continuously increasing, e...
Designing security for a computer system is best done by utilizing a systematic engineering approach...
[[abstract]]Security system architecture governs the composition of components in security systems a...
The Trusted Computing Base (TCB) describes the part of an IT system that is responsible for enforcin...
ii As computerized systems have become an important part of society and its infrastruc-ture, the nee...
Designing a secure software system requires the ability to represent and reason about a wide variety...
International audienceSeveral development approaches have been proposed to handle the growing comple...