Sciweavers

626 search results - page 23 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
CCS
2008
ACM
14 years 8 days ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
OOPSLA
1998
Springer
14 years 2 months ago
Visualizing Dynamic Software System Information Through High-Level Models
Dynamic information collected as a software system executes can help software engineers perform some tasks on a system more effectively. To interpret the sizable amount of data ge...
Robert J. Walker, Gail C. Murphy, Bjørn N. ...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 4 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
PKDD
1999
Springer
109views Data Mining» more  PKDD 1999»
14 years 2 months ago
Predicting Chemical Carcinogenesis Using Structural Information Only
This paper reports on the application of the Strongly Typed Evolutionary Programming System STEPS to the PTE2 challenge, which consists of predicting the carcinogenic activity of...
Claire J. Kennedy, Christophe G. Giraud-Carrier, D...
SECURWARE
2007
IEEE
14 years 4 months ago
Temporal Verification in Secure Group Communication System Design
The paper discusses an experience in using a realtime UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirement...
Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes...