Sciweavers

281 search results - page 26 / 57
» An Infrastructure for Intertheory Reasoning
Sort
View
CCS
2006
ACM
13 years 11 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
ESORICS
2006
Springer
13 years 11 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
CRITIS
2007
13 years 9 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
FM
2008
Springer
77views Formal Methods» more  FM 2008»
13 years 9 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
ECSCW
2007
13 years 8 months ago
Making the Home Network at Home: Digital Housekeeping
This paper exploits ethnographic findings to build on and elaborate Grinter et al’s 2005 study of “the work to make the home network work”. We focus particularly on the work ...
Peter Tolmie, Andy Crabtree, Tom Rodden, Chris Gre...