𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Methodology for security analysis of data-processing systems

✍ Scribed by John M. Caroll; Oi-Lun Wu


Publisher
Elsevier Science
Year
1983
Tongue
English
Weight
803 KB
Volume
2
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Data security in information systems by
✍ H.P. Meinzer; B. Sandblad πŸ“‚ Article πŸ“… 1979 πŸ› Elsevier Science βš– 412 KB

The paper describes how a language analyser (parser) is used as interface between a user and the functions of an information system. A specific user is at log-on forced into a sublanguage analyser, which only recognizes statements relevant to this specific user. Every attempt to use non-allowed func

Using Petri-nets for data processing sys
✍ V.V. Kulba; A.R. Shvetsov πŸ“‚ Article πŸ“… 1991 πŸ› Elsevier Science 🌐 English βš– 550 KB

Kulba, V.V. and A.R. Shvetsov, Using Petri-nets for data processing systems analysis and synthesis, Mathematics and Computers in Simulation 33 (1991) 317-321. The article deals with some problems connected with analysis and synthesis of Data Processing Systems under time criteria. Modelling of a DPS

An advanced methodology for steady-state
✍ D. P. Popovic; D. M. Dobrijevic; N. A. Mijuskovic; D. J. Vlaisavljevic πŸ“‚ Article πŸ“… 2001 πŸ› John Wiley and Sons 🌐 English βš– 922 KB

## Abstract The basic objective of this paper is to present the relevant aspects of an advanced methodology for steady‐state security assessment of power systems. This methodology consists of the following relevant parts: procedure for forming the unified external network equivalents, with adaptive