Sciweavers

3420 search results - page 62 / 684
» A Language-Based Approach to Security
Sort
View
SASN
2004
ACM
14 years 3 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
SRDS
1999
IEEE
14 years 2 months ago
Trust and Electronic Commerce - More than a Technical Problem
In our paper we argue that the building of trust in electronic commerce depends only partly on technical security and the knowledge of security gaps and ways of closing them. It i...
Kornelia Konrad, Gerhard Fuchs, Jochen Barthel
ESSOS
2009
Springer
14 years 1 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
CCS
2006
ACM
14 years 1 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
ZUM
2000
Springer
14 years 1 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper