Model-based Security Engineering
This event took place on Tuesday 25 April 2006 at 12:30
Dr Jan Jurjens Technical University of Munich
The current state of the art in security-critical software is far from satisfactory: New security vulnerabilities are detected on an almost daily basis. To improve this situation, we develop techniques and tools that perform an automated analysis of software artefacts for security requirements (such as secrecy, integrity, and authenticity). These artefacts include specifications in the Unified Modeling Language (UML), annotated source code, and run-time data such as security permissions. The security analysis techniques make use of model-checkers and automated theorem provers for first-order logic. We give examples for security flaws found in industrial software using our tools.
Download PowerPoint presentation (3.4Mb ZIP file)
This event took place on Tuesday 25 April 2006 at 12:30
The current state of the art in security-critical software is far from satisfactory: New security vulnerabilities are detected on an almost daily basis. To improve this situation, we develop techniques and tools that perform an automated analysis of software artefacts for security requirements (such as secrecy, integrity, and authenticity). These artefacts include specifications in the Unified Modeling Language (UML), annotated source code, and run-time data such as security permissions. The security analysis techniques make use of model-checkers and automated theorem provers for first-order logic. We give examples for security flaws found in industrial software using our tools.
Download PowerPoint presentation (3.4Mb ZIP file)
Future Internet
KnowledgeManagementMultimedia &
Information SystemsNarrative
HypermediaNew Media SystemsSemantic Web &
Knowledge ServicesSocial Software
Social Software is...

Interacting with other people not only forms the core of human social and psychological experience, but also lies at the centre of what makes the internet such a rich, powerful and exciting collection of knowledge media. We are especially interested in what happens when such interactions take place on a very large scale -- not only because we work regularly with tens of thousands of distance learners at the Open University, but also because it is evident that being part of a crowd in real life possesses a certain 'buzz' of its own, and poses a natural challenge. Different nuances emerge in different user contexts, so we choose to investigate the contexts of work, learning and play to better understand the trade-offs involved in designing effective large-scale social software for multiple purposes.
Check out these Hot Social Software Projects:
List all Social Software Projects
Check out these Hot Social Software Technologies:
List all Social Software Technologies
List all Social Software Projects
Check out these Hot Social Software Technologies:
List all Social Software Technologies

