Sciweavers

3821 search results - page 99 / 765
» A Security Model for Aglets
Sort
View
FSKD
2005
Springer
102views Fuzzy Logic» more  FSKD 2005»
14 years 1 months ago
A Fuzzy Mixed Projects and Securities Portfolio Selection Model
The business environment is full of uncertainties. Investing in various asset classes may lower the risk of overall portfolio and increase the potential for greater returns. In thi...
Yong Fang, K. K. Lai, Shouyang Wang
FOSAD
2009
Springer
14 years 2 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
WWW
2008
ACM
14 years 8 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
ACSAC
2005
IEEE
14 years 1 months ago
Model Checking An Entire Linux Distribution for Security Violations
Software model checking has become a popular tool for verifying programs’ behavior. Recent results suggest that it is viable for finding and eradicating security bugs quickly. ...
Benjamin Schwarz, Hao Chen, David Wagner, Jeremy L...