Sciweavers

3482 search results - page 151 / 697
» Designing for security
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
FOSSACS
2004
Springer
14 years 2 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
IEEESP
2007
98views more  IEEESP 2007»
13 years 9 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
WWW
2009
ACM
14 years 9 months ago
Securely implementing open geospatial consortium web service interface standards in oracle spatial
In this paper, we briefly describe the implementation of various Open Geospatial Consortium Web Service Interface Standards in Oracle Spatial 11g. We highlight how we utilize Orac...
Ning An, Raja Chatterjee, Mike Hörhammer, Siv...