Secure System Modeling: Integrating Security Attacks with Statecharts.
Omar el ArissDianxiang XuPublished in: Int. J. Softw. Informatics (2012)
Keyphrases
- security mechanisms
- security measures
- security protocols
- cryptographic protocols
- stream cipher
- security issues
- security threats
- security requirements
- secure routing
- chosen plaintext
- security problems
- countermeasures
- security flaws
- key management
- security level
- cryptographic algorithms
- information leakage
- security services
- access control
- computer security
- information security
- protection mechanisms
- security management
- cyber attacks
- security risks
- key agreement protocol
- insider attacks
- data security
- security patterns
- security architecture
- security properties
- security analysis
- unauthorized access
- digital signature
- data encryption
- authentication scheme
- identity management
- encryption scheme
- security policies
- authentication protocol
- advanced encryption standard
- sensitive data
- sql injection
- intrusion detection system
- security vulnerabilities
- secret key
- block cipher
- java card