Sciweavers

3482 search results - page 21 / 697
» Designing for security
Sort
View
CAISE
2006
Springer
14 years 16 days ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 8 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
14 years 2 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...
SASN
2003
ACM
14 years 2 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
14 years 3 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...