Model-based Security Engineering
This event took place on Tuesday 25 April 2006 at 12:30
Dr Jan Jurjens Technical University of Munich
The current state of the art in security-critical software is far from satisfactory: New security vulnerabilities are detected on an almost daily basis. To improve this situation, we develop techniques and tools that perform an automated analysis of software artefacts for security requirements (such as secrecy, integrity, and authenticity). These artefacts include specifications in the Unified Modeling Language (UML), annotated source code, and run-time data such as security permissions. The security analysis techniques make use of model-checkers and automated theorem provers for first-order logic. We give examples for security flaws found in industrial software using our tools.
Download PowerPoint presentation (3.4Mb ZIP file)
This event took place on Tuesday 25 April 2006 at 12:30
The current state of the art in security-critical software is far from satisfactory: New security vulnerabilities are detected on an almost daily basis. To improve this situation, we develop techniques and tools that perform an automated analysis of software artefacts for security requirements (such as secrecy, integrity, and authenticity). These artefacts include specifications in the Unified Modeling Language (UML), annotated source code, and run-time data such as security permissions. The security analysis techniques make use of model-checkers and automated theorem provers for first-order logic. We give examples for security flaws found in industrial software using our tools.
Download PowerPoint presentation (3.4Mb ZIP file)
Future Internet
KnowledgeManagementMultimedia &
Information SystemsNarrative
HypermediaNew Media SystemsSemantic Web &
Knowledge ServicesSocial Software
Knowledge Management is...

Our aim is to capture, analyse and organise knowledge, regardless of its origin and form and make it available to the learner when needed presented with the necessary context and in a form supporting the learning processes.
Check out these Hot Knowledge Management Projects:
List all Knowledge Management Projects
Check out these Hot Knowledge Management Technologies:
List all Knowledge Management Technologies
List all Knowledge Management Projects
Check out these Hot Knowledge Management Technologies:
List all Knowledge Management Technologies



