Sciweavers

756 search results - page 121 / 152
» Modeling Computational Security in Long-Lived Systems
Sort
View
WORDS
2005
IEEE
14 years 3 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
ASIACRYPT
2004
Springer
14 years 3 months ago
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Bartosz Przydatek, Reto Strobl
SAC
2010
ACM
14 years 4 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 1 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
IEEEARES
2007
IEEE
14 years 4 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer