2004
DOI: 10.1109/tdsc.2004.11
|View full text |Cite
|
Sign up to set email alerts
|

Model-based evaluation: from dependability to security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
158
0
8

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 403 publications
(166 citation statements)
references
References 108 publications
0
158
0
8
Order By: Relevance
“…The already cited papers [1,37] provide a survey of the most popular ones. The choice of the most appropriate type of model to employ depends upon the complexity of the system under analysis, the specific aspects to be studied, the attributes to be evaluated, the accuracy required, and the resources available for the study.…”
Section: Related Workmentioning
confidence: 99%
“…The already cited papers [1,37] provide a survey of the most popular ones. The choice of the most appropriate type of model to employ depends upon the complexity of the system under analysis, the specific aspects to be studied, the attributes to be evaluated, the accuracy required, and the resources available for the study.…”
Section: Related Workmentioning
confidence: 99%
“…In an earlier paper by Nicol et al [35], a similar challenge was stated: to develop a sound model-based methodology for quantifying the security that can be anticipated from a design.…”
Section: Formal Security Architecturesmentioning
confidence: 99%
“…Software model checkers automatically explore all paths from a start state by examining transitions in the state space to determine the reachability of a state that violates a property. [8] The properties are verified as holding or not holding for each transition. This automation provides high value for large, complex systems where specifications are complex.…”
Section: Model Checking and Property-based Testingmentioning
confidence: 99%
“…The number of follow-on discussions on security property specifications is witness to this problem. [4,6,7,8] The need to formally specify and verify security properties is easily seen by the growing list of software vulnerabilities. [9] It is apparent that better specification and verification of security properties will lead to more secure software.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation