Sciweavers

3821 search results - page 91 / 765
» A Security Model for Aglets
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
POLICY
2007
Springer
14 years 1 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
CSFW
2006
IEEE
14 years 1 months ago
Information-Flow Security for Interactive Programs
Abstract. Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about...
Kevin R. O'Neill, Michael R. Clarkson, Stephen Cho...
CCS
2008
ACM
13 years 9 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
IEEEIAS
2009
IEEE
14 years 2 months ago
Action-Based Access Control for Web Services
: Web services over the Internet are widely used nowadays. The problem of secure access to Web-based systems is of great importance naturally. Compared with the existing models, th...
FengHua Li, Wei Wang, Jianfeng Ma, Haoxin Su