Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy requirements for the internet of things: A survey
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
Design notations for secure software: a systematic literature review
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …
notations to represent security properties and concepts in a design artifact. These notations …
Component-based refinement and verification of information-flow security policies for cyber-physical microservice architectures
C Gerking, D Schubert - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
Since cyber-physical systems are inherently vulnerable to information leaks, software
architects need to reason about security policies to define desired and undesired …
architects need to reason about security policies to define desired and undesired …
Test-suite-guided discovery of least privilege for cloud infrastructure as code
R Shimizu, Y Nunomura, H Kanuka - Automated Software Engineering, 2024 - Springer
Infrastructure as code (IaC) for the cloud, which automatically configures a system's cloud
environment from source code, is an important practice thanks to its efficient, reproducible …
environment from source code, is an important practice thanks to its efficient, reproducible …
A security modeling and verification method of embedded software based on Z and MARTE
The existing modeling and verification methods for embedded software are insufficient
towards the increasingly prominent security requirements. In this paper, aiming at high …
towards the increasingly prominent security requirements. In this paper, aiming at high …
Test-based least privilege discovery on cloud infrastructure as code
R Shimizu, H Kanuka - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Infrastructure as Code (IaC) for cloud is an important practice due to its efficient and
reproducible provisioning of cloud environments. On a cloud IaC definition (template) …
reproducible provisioning of cloud environments. On a cloud IaC definition (template) …
Designing security and privacy requirements in Internet of Things: A survey
The design and development process for the Internet of Things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
Extended RBAC model with task-constraint rules
L Ma, Y Zhou, W Duan - Future Information Technology: FutureTech 2013, 2014 - Springer
RBAC model supports the principle of least privilege by the appropriate combination of roles
assigned to users. However, the minimum role set is hard to find. Role hierarchy and …
assigned to users. However, the minimum role set is hard to find. Role hierarchy and …
An overview of CARAT: a computer assisted research and analysis tool
JM Snyder, KJ Lynch - … of the Twenty-Fourth Annual Hawaii …, 1991 - ieeexplore.ieee.org
The Mosaic Group at the University of Arizona studies the design, implementation, testing,
and validation of integrated collaborative research systems (ICRS). The authors describe …
and validation of integrated collaborative research systems (ICRS). The authors describe …
Task-constrained rbac model and its privilege redundancy analysis
Y Zhou, L Ma, M Wen - 2015 2nd International Conference on …, 2015 - ieeexplore.ieee.org
RBAC supports the principle of least privilege by the appropriate combination of roles
assigned to users. However, the minimum role set is hard to find. Role hierarchy and …
assigned to users. However, the minimum role set is hard to find. Role hierarchy and …