Sciweavers

2270 search results - page 75 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HIPEAC
2005
Springer
14 years 2 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
COOPIS
2003
IEEE
14 years 2 months ago
Jini Supporting Ubiquitous and Pervasive Computing
The overall purpose of this article is partly to give a brief overview of the TangO conceptual model, partly to explore the Jini technology as a means for support of pervasive syst...
Kasper Hallenborg, Bent Bruun Kristensen
WSC
2004
13 years 10 months ago
Fast Model-Based Penetration Testing
Traditional approaches to security evaluation have been based on penetration testing of real systems, or analysis of formal models of such systems. The former suffer from the prob...
Sankalp Singh, James Lyons, David M. Nicol
HOTOS
1997
IEEE
14 years 29 days ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
OTM
2007
Springer
14 years 2 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...