Sciweavers

2270 search results - page 130 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HICSS
2000
IEEE
107views Biometrics» more  HICSS 2000»
14 years 1 months ago
A Project Management Model based on Shared Understanding
Traditionally in industrial system development, the total project is decomposed into phases. The result from one phase, normally a document or a system component, is passed to the...
Ulf Cederling, Roland Ekinge, Bengt Lennartsson, L...
LISA
2007
13 years 11 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
ACSAC
2001
IEEE
14 years 17 days ago
Information Flow Analysis of Component-Structured Applications
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
Peter Herrmann
ENTCS
2008
118views more  ENTCS 2008»
13 years 9 months ago
The STSLib Project: Towards a Formal Component Model Based on STS
We present the current state of our STSLib project. This project aims at defining an environment to formally specify and execute software components. One important feature is that...
Fabrício Fernandes, Jean-Claude Royer
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 2 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee