Sciweavers

418 search results - page 17 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
13 years 8 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
14 years 2 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
CBSE
2004
Springer
14 years 2 months ago
CB-SPE Tool: Putting Component-Based Performance Engineering into Practice
A crucial issue in the design of Component-Based (CB) applications is the ability to early guarantee that the system under development will satisfy its Quality of Service requireme...
Antonia Bertolino, Raffaela Mirandola
FTDCS
2004
IEEE
14 years 17 days ago
Introducing Compositionality in Web Service Descriptions
Web services are essentially black box components from a composer's or a mediator's perspective. The behavioural description of any service can be asserted by the compos...
Monika Solanki, Antonio Cau, Hussein Zedan
AINA
2004
IEEE
14 years 18 days ago
Supervising Secret-Key Agreements in a Level-Based Hierarchy
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can commun...
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang