Author of the publication

Reconstructing a formal security model.

, , and . Information & Software Technology, 44 (11): 649-657 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role-Based Authorization Constraints Specification Using Object Constraint Language., and . WETICE, page 157-162. IEEE Computer Society, (2001)Software requirements and architecture modeling for evolving non-secure applications into secure applications., and . Sci. Comput. Program., 66 (1): 60-70 (2007)Reconstructing a formal security model., , and . Information & Software Technology, 44 (11): 649-657 (2002)Self-Management of Component Executors for Robot Applications., , , , , , and . SEKE, page 653-656. Knowledge Systems Institute Graduate School, (2010)Threat Modeling for Security Failure-Tolerant Requirements., , and . SocialCom, page 594-599. IEEE Computer Society, (2013)Blackboard Architecture for Detecting and Notifying Failures for Component-Based Unmanned Systems., , and . J. Intell. Robotic Syst., 90 (3-4): 571-585 (2018)Self-healing components in robust software architecture for concurrent and distributed systems.. Sci. Comput. Program., 57 (1): 27-44 (2005)Security Requirements for Tolerating Security Failures., and . SEKE, page 487-490. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2017)Consistency in Self-Reconfiguration of Self-Healing Systems., and . SEKE, page 10-15. Knowledge Systems Institute Graduate School, (2009)Software Architecture for Self-Healing of Concurrent and Distributed Components.. Software Engineering Research and Practice, page 97-103. CSREA Press, (2004)