Sciweavers

3482 search results - page 116 / 697
» Designing for security
Sort
View
ECOOPW
1999
Springer
14 years 1 months ago
Security in Active Networks
The desire for exible networking services has given rise to the concept of active networks." Active networks provide a general framework for designing and implementing network...
D. Scott Alexander, William A. Arbaugh, Angelos D....
IASTEDSEA
2004
13 years 10 months ago
Insecurity by contract
Design by Contract is a design methodology that promotes software reliability and reusability by requiring each component module to have a well-specified interface and leaves a mo...
Phillip L. Nico, Clark Savage Turner, Kimberly Kno...
NDSS
2000
IEEE
14 years 1 months ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...
COMPSEC
2006
141views more  COMPSEC 2006»
13 years 9 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
DGO
2004
78views Education» more  DGO 2004»
13 years 10 months ago
Scalable and Secure Data Collection: Fault Tolerance Considerations
Data collection, or uploading, is an inherent part of numerous digital government applications. In this poster we present our recent research directions in the development of Bist...
William C. Cheng, Leslie Cheung, Cheng-Fu Chou, Le...