Sciweavers

537 search results - page 27 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 7 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
14 years 1 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
AICT
2007
IEEE
122views Communications» more  AICT 2007»
13 years 9 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
ICCBSS
2003
Springer
14 years 23 days ago
Estimating the Cost of Security for COTS Software
Abstract. This paper describes enhancements being made to the University of Southern California’s COnstructive COTS (COCOTS) integration cost model to address security concerns. ...
Donald J. Reifer, Barry W. Boehm, Murali Gangadhar...
ASWEC
2008
IEEE
14 years 2 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...