Model-based Security Engineering
This event took place on Tuesday 25 April 2006 at 12:30
Dr Jan Jurjens Technical University of Munich
The current state of the art in security-critical software is far from satisfactory: New security vulnerabilities are detected on an almost daily basis. To improve this situation, we develop techniques and tools that perform an automated analysis of software artefacts for security requirements (such as secrecy, integrity, and authenticity). These artefacts include specifications in the Unified Modeling Language (UML), annotated source code, and run-time data such as security permissions. The security analysis techniques make use of model-checkers and automated theorem provers for first-order logic. We give examples for security flaws found in industrial software using our tools.
Download PowerPoint presentation (3.4Mb ZIP file)
This event took place on Tuesday 25 April 2006 at 12:30
The current state of the art in security-critical software is far from satisfactory: New security vulnerabilities are detected on an almost daily basis. To improve this situation, we develop techniques and tools that perform an automated analysis of software artefacts for security requirements (such as secrecy, integrity, and authenticity). These artefacts include specifications in the Unified Modeling Language (UML), annotated source code, and run-time data such as security permissions. The security analysis techniques make use of model-checkers and automated theorem provers for first-order logic. We give examples for security flaws found in industrial software using our tools.
Download PowerPoint presentation (3.4Mb ZIP file)
Future Internet
KnowledgeManagementMultimedia &
Information SystemsNarrative
HypermediaNew Media SystemsSemantic Web &
Knowledge ServicesSocial Software
Future Internet is...

To succeed the Future Internet will need to address a number of cross-cutting challenges including:
- Scalability in the face of peer-to-peer traffic, decentralisation, and increased openness
- Trust when government, medical, financial, personal data are increasingly trusted to the cloud, and middleware will increasingly use dynamic service selection
- Interoperability of semantic data and metadata, and of services which will be dynamically orchestrated
- Pervasive usability for users of mobile devices, different languages, cultures and physical abilities
- Mobility for users who expect a seamless experience across spaces, devices, and velocities
Future Internet from KMi.
Check out these Hot Future Internet Projects:
List all Future Internet Projects
Check out these Hot Future Internet Technologies:
List all Future Internet Technologies
List all Future Internet Projects
Check out these Hot Future Internet Technologies:
List all Future Internet Technologies



