Sciweavers

106 search results - page 10 / 22
» Modelling Mobility Aspects of Security Policies
Sort
View
ASM
2010
ASM
14 years 2 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
WOA
2000
13 years 8 months ago
How a Secure and Open Mobile Agent Framework Suits Electronic Commerce Applications
The Mobile Agent (MA) paradigm seems able to support effectively distributed applications in open and heterogeneous environments, and application areas such as ecommerce appear to...
Paolo Bellavista, Antonio Corradi, Rebecca Montana...
VLDB
1993
ACM
73views Database» more  VLDB 1993»
13 years 11 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
JUCS
2010
159views more  JUCS 2010»
13 years 2 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
DMS
2010
147views Multimedia» more  DMS 2010»
13 years 5 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper