Sciweavers

3821 search results - page 220 / 765
» A Security Model for Aglets
Sort
View
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
14 years 2 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...
HOTOS
1997
IEEE
14 years 1 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
ESORICS
2006
Springer
14 years 1 months ago
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Abstract We present a computational analysis of basic Kerberos with and without its public-key extension PKINIT in which we consider authentication and key secrecy properties. Our ...
Michael Backes, Iliano Cervesato, Aaron D. Jaggard...
APSCC
2009
IEEE
14 years 4 months ago
Security meta-services orchestration architecture
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunit...
Aymen Baouab, Olivier Perrin, Nicolas Biri, Claude...
COLCOM
2007
IEEE
14 years 3 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...