All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Heterogeneous Modelling Applied in System Security

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F05%3APU56477" target="_blank" >RIV/00216305:26230/05:PU56477 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Heterogeneous Modelling Applied in System Security

  • Original language description

    This paper deals with methods and approaches of heterogeneous modelling and its<br> application in risk analysis and modelling. Risk analysis is one of many tools<br> for security improvement. The main idea of that is based on analysis of<br> gathered information about observed company and following searching for<br> some group of countermeasures which can reduce a risk. We start this paper by<br> describing modern aspects of heterogeneity in computer modelling and we continue<br> with an overview of riisk analysis in heterogeneous manner.

  • Czech name

    Heterogeneous Modelling Applied in System Security

  • Czech description

    This paper deals with methods and approaches of heterogeneous modelling and its<br> application in risk analysis and modelling. Risk analysis is one of many tools<br> for security improvement. The main idea of that is based on analysis of<br> gathered information about observed company and following searching for<br> some group of countermeasures which can reduce a risk. We start this paper by<br> describing modern aspects of heterogeneity in computer modelling and we continue<br> with an overview of riisk analysis in heterogeneous manner.

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/GA102%2F04%2F0871" target="_blank" >GA102/04/0871: Information system security - research of attacks on tamper-resistant cryptographic hardware</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2005

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the International Workshop MOSMIC'2005

  • ISBN

    80-8070-139-3

  • ISSN

  • e-ISSN

  • Number of pages

    7

  • Pages from-to

    30-36

  • Publisher name

    Faculty of management science and Informatics of Zilina University

  • Place of publication

    Žilina

  • Event location

    Žilina

  • Event date

    Sep 30, 2003

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article