Sciweavers

3482 search results - page 128 / 697
» Designing for security
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 9 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
ENTCS
2007
131views more  ENTCS 2007»
13 years 9 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
OOPSLA
2005
Springer
14 years 2 months ago
CanonSketch and TaskSketch: innovative modeling tools for usage-centered design
Two experimental tools to support usage-centered design using l use cases and canonical abstract prototypes are described. The models and methods of usage-centered design are outl...
Larry L. Constantine, Pedro Campos
SIGOPSE
2004
ACM
14 years 2 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
14 years 2 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...