Sciweavers

3821 search results - page 87 / 765
» A Security Model for Aglets
Sort
View
CCS
2010
ACM
13 years 11 months ago
Apex: extending Android permission model and enforcement with user-defined runtime constraints
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giv...
Mohammad Nauman, Sohail Khan, Xinwen Zhang
SCN
2010
Springer
122views Communications» more  SCN 2010»
13 years 6 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
CSFW
2005
IEEE
14 years 1 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
ISI
2006
Springer
13 years 7 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
SP
2000
IEEE
14 years 3 days ago
Security and Source Code Access: Issues and Realities
This position paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source cod...
Steven B. Lipner