Sciweavers

2270 search results - page 153 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
119
Voted
CSFW
2010
IEEE
15 years 7 months ago
Towards a Formal Foundation of Web Security
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
128
Voted
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
15 years 8 months ago
Modeling and Analyzing Communications Infrastructure A Case Study of an International Organization
EnCompass®1 , a web-enabled system for organizational process visualization, analysis, synthesis, and management, provides an interactive vehicle for understanding the influence ...
Michael M. Mann, Ericka Hansen Bryant
DANCE
2002
IEEE
15 years 8 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
111
Voted
IMC
2009
ACM
15 years 10 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
133
Voted
CCS
2009
ACM
15 years 8 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...