Sciweavers

3482 search results - page 127 / 697
» Designing for security
Sort
View
WWW
2011
ACM
13 years 4 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
IADIS
2004
13 years 10 months ago
Voting with Designated Verifier Signature-Like Protocol
We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other u...
Emmanuel Dall'Olio, Olivier Markowitch
KBSE
2005
IEEE
14 years 2 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
EPEW
2005
Springer
14 years 2 months ago
Choreographing Security and Performance Analysis for Web Services
We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from ...
Stephen Gilmore, Valentin Haenel, Leïla Kloul...
FPL
2001
Springer
92views Hardware» more  FPL 2001»
14 years 1 months ago
Secure Configuration of Field Programmable Gate Arrays
Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominate the industry due to their density and performance advantages over non-volatile technolog...
Tom Kean