Recent security breaches show the need to secure large, distributed, complex systems. A fundamental, but little discussed aspect of security is how to evaluate when a complete system is secure. Purely formal methods cannot handle this level of complexity. Code checking does not consider the interaction of separate modules working together and is hard to scale. Model-based approaches, such as patterns and problem frames, can be effective for handling large systems. Their use in evaluating security appears promising. A few works in this direction exist, but there is a need for more ideas. This Special Issue focuses on global, model-based, architectural, and systems-oriented evaluation methods
A method for evaluating security models is developed and applied to the model of Bell and LaPadula. ...
The most effective approach to evaluating the security of complex systems is to deliberately constru...
Systems of systems (SoS) are large-scale systems composed of complex systems with difficult to predi...
Recent security breaches show the need to secure large, distributed, complex systems. A fundamental,...
It is possible to reasonably measure the security quality of individual security patterns. However, ...
International audienceSecuring critical systems such as cyber physical systems (CPS) is an important...
Rapid technological advances in recent years have precipitated a general shift towards software dist...
International audienceA security pattern is a reusable solution for a specific security issue. Based...
We initiated an international collaboration between our security groups a few years ago, centered on...
This paper describes a risk assessment method suited for large systems. In essence, the method has b...
Addressing the challenges of developing secure software systems remains an active research area in s...
A good way to obtain secure systems is to build applications in a systematic way where security is a...
Addressing the challenges of developing secure software systems remains an active research area in s...
Model checking approaches to the analysis of security protocols have proved remarkably successful. T...
Abstract: This paper describes a risk assessment method suited for large systems. In essence, the me...
A method for evaluating security models is developed and applied to the model of Bell and LaPadula. ...
The most effective approach to evaluating the security of complex systems is to deliberately constru...
Systems of systems (SoS) are large-scale systems composed of complex systems with difficult to predi...
Recent security breaches show the need to secure large, distributed, complex systems. A fundamental,...
It is possible to reasonably measure the security quality of individual security patterns. However, ...
International audienceSecuring critical systems such as cyber physical systems (CPS) is an important...
Rapid technological advances in recent years have precipitated a general shift towards software dist...
International audienceA security pattern is a reusable solution for a specific security issue. Based...
We initiated an international collaboration between our security groups a few years ago, centered on...
This paper describes a risk assessment method suited for large systems. In essence, the method has b...
Addressing the challenges of developing secure software systems remains an active research area in s...
A good way to obtain secure systems is to build applications in a systematic way where security is a...
Addressing the challenges of developing secure software systems remains an active research area in s...
Model checking approaches to the analysis of security protocols have proved remarkably successful. T...
Abstract: This paper describes a risk assessment method suited for large systems. In essence, the me...
A method for evaluating security models is developed and applied to the model of Bell and LaPadula. ...
The most effective approach to evaluating the security of complex systems is to deliberately constru...
Systems of systems (SoS) are large-scale systems composed of complex systems with difficult to predi...