Sciweavers

1005 search results - page 26 / 201
» Information systems security engineering: a critical compone...
Sort
View
CAINE
2003
13 years 10 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
EUROSYS
2008
ACM
14 years 5 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
KBSE
1995
IEEE
14 years 10 days ago
Towards an Epistemology for Software Representations
The KBSE community is actively engaged in finding ways to represent software and the activities that relate to various stages in its lifecycle. While the wealth of modeling activ...
Christopher A. Welty
APSEC
2005
IEEE
14 years 2 months ago
Ontology-based Active Requirements Engineering Framework
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...
Seok Won Lee, Robin A. Gandhi
PLDI
2006
ACM
14 years 2 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober