Sciweavers

129 search results - page 13 / 26
» Identifying Security Aspects in Early Development Stages
Sort
View
JCM
2007
101views more  JCM 2007»
13 years 6 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
VAMOS
2007
Springer
14 years 25 days ago
An Aspect-oriented Approach for Representing Variability in Product Line Architecture
Aspect-oriented software development has recently emerged as a new paradigm for systematic modularization and representation of the crosscutting concern. Because the variability i...
Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom
WWW
2006
ACM
14 years 7 months ago
Safeguard against unicode attacks: generation and applications of UC-simlist
A severe potential security problem in utilization of Unicode in the Web is identified, which is resulted from the fact that there are many similar characters in the Unicode Chara...
Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin
CSFW
1999
IEEE
13 years 11 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
ISI
2008
Springer
13 years 6 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....