Sciweavers

3821 search results - page 51 / 765
» A Security Model for Aglets
Sort
View
ISSE
2006
15 years 3 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
98
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
136
Voted
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 7 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
96
Voted
SACMAT
2009
ACM
15 years 10 months ago
Extending access control models with break-glass
Achim D. Brucker, Helmut Petritsch
129
Voted
ACISP
2008
Springer
15 years 9 months ago
Comparing the Pre- and Post-specified Peer Models for Key Agreement
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the oth...
Alfred Menezes, Berkant Ustaoglu