Sciweavers

2270 search results - page 56 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ESORICS
2003
Springer
14 years 1 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
EUROPLOP
2006
13 years 10 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
COMPSAC
2010
IEEE
13 years 6 months ago
Challenges and Future Directions of Software Technology: Secure Software Development
Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure sy...
Bhavani M. Thuraisingham, Kevin W. Hamlen
JNSM
2000
122views more  JNSM 2000»
13 years 8 months ago
Communications Systems Driven by Software Agent Technology
The application of software agent technology to the management of communications' infrastructures is a challenging domain as it requires management on different time scales a...
Alex L. Hayzelden, John Bigham, Stefan Poslad, Phi...
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 8 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart