Sciweavers

537 search results - page 17 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
WETICE
2000
IEEE
13 years 12 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop
JCIT
2010
144views more  JCIT 2010»
13 years 2 months ago
A Model for Software Selection with Fuzzy Linguistic Information
With respect to multiple attribute decision making problem with triangular fuzzy linguistic information, in which the attribute weights and expert weights take the form of real nu...
Juchi Hou
ESORICS
2000
Springer
13 years 11 months ago
Checking Secure Interactions of Smart Card Applets
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
JCS
2002
132views more  JCS 2002»
13 years 7 months ago
Checking Secure Interactions of Smart Card Applets: Extended Version
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...