Sciweavers

2358 search results - page 145 / 472
» A Secure Pervasive Environment
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 3 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
GCC
2004
Springer
14 years 2 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
ECIS
2003
13 years 10 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
JNW
2008
112views more  JNW 2008»
13 years 9 months ago
A Conceptual Model for Analysis and Design of Tunable Security Services
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices ...
Stefan Lindskog, Zoltán Faigl, Anna Brunstr...
JALC
2006
125views more  JALC 2006»
13 years 9 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall