A review on security requirements specification by formal methods

AD Mishra, K Mustafa - Concurrency and Computation …, 2022 - Wiley Online Library
Security is an afterthought process for the development of software in earlier days but now
the time has been changed. Now, security is on top priority and involved from the beginning …

A blockchain-based consent mechanism for access to fitness data in the healthcare context

M Alhajri, C Rudolph, AS Shahraki - IEEE Access, 2022 - ieeexplore.ieee.org
Wearable fitness devices are widely used to track an individual's health and physical
activities to improve the quality of health services. These devices sense a considerable …

Transformation-based model checking temporal trust in multi-agent systems

N Drawel, A Laarej, J Bentahar… - Journal of Systems and …, 2022 - Elsevier
Several formal trust frameworks have been introduced in the area of Multi-Agent Systems
(MASs). However, the problem of model checking trust logics is still a challenging research …

Engineering secure systems: Models, patterns and empirical validation

B Hamid, D Weber - Computers & Security, 2018 - Elsevier
Several development approaches have been proposed to handle the growing complexity of
software system design. The most popular methods use models as the main artifacts to …

Security patterns modeling and formalization for pattern-based development of secure software systems

B Hamid, S Gürgens, A Fuchs - Innovations in Systems and Software …, 2016 - Springer
Pattern-based development of software systems has gained more attention recently by
addressing new challenges such as security and dependability. However, there are still …

[PDF][PDF] Verifying Temporal Trust Logic using CTL Model Checking.

N Drawel, J Bentahar, M El-Menshawy, A Laarej - TRUST@ AAMAS, 2018 - academia.edu
Several formal trust frameworks have been introduced in the area of Multi-Agent Systems
(MASs). However, the problem of model checking trust logics is still a challenging research …

Enforcing S&D pattern design in RCES with modeling and formal approaches

B Hamid, S Gürgens, C Jouvray, N Desnos - Model Driven Engineering …, 2011 - Springer
The requirement for higher security and dependability of systems is continuously increasing
even in domains not traditionally deeply involved in such issues. Yet, evolution of embedded …

Security requirements specification by formal methods: a research metadata analysis

AD Mishra, K Mustafa - Multimedia Tools and Applications, 2024 - Springer
In recent years, the field of security requirements specification by formal methods has
changed radically. The security requirement specification is now one of the widely …

A modeling and formal approach for the precise specification of security patterns

B Hamid, C Percebois - Engineering Secure Software and Systems: 6th …, 2014 - Springer
Non-functional requirements such as Security and Dependability (S &D) become more
important as well as more difficult to achieve. In fact, the integration of security features …

Formal notions of trust and confidentiality-enabling reasoning about system security

A Fuchs, S Gürgens, C Rudolph - Journal of Information Processing, 2011 - jstage.jst.go.jp
Historically, various different notions of trust can be found, each addressing particular
aspects of ICT systems, eg, trust in electronic commerce systems based on reputation and …