Sciweavers

1352 search results - page 78 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
CIE
2007
Springer
14 years 27 days ago
A Classification of Viruses Through Recursion Theorems
We study computer virology from an abstract point of view. Viruses and worms are self-replicating programs, whose constructions are essentially based on Kleene's second recurs...
Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves ...
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 3 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
11 years 11 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
MINAR
1998
Springer
117views Multimedia» more  MINAR 1998»
14 years 1 months ago
Supporting Video Applications Through 4DIS Temporal Framework
Abstract. Video has become an essential component of multimedia applications nowadays. To support multimedia and video applications efciently, video objects must be modeled and str...
Rynson W. H. Lau, Hong Va Leong, Qing Li, Antonio ...