Sciweavers

2846 search results - page 88 / 570
» Not one click for security
Sort
View
NETWORKING
2008
15 years 5 months ago
A Secure Mechanism for Address Block Allocation and Distribution
Abstract. All equipments attached to the Internet are configured with one or several IP addresses. Most hosts are able to automatically request (e.g., from a DHCP server) or discov...
Damien Leroy, Olivier Bonaventure
ENTCS
2000
112views more  ENTCS 2000»
15 years 4 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
VLDB
2002
ACM
74views Database» more  VLDB 2002»
15 years 4 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
IAJIT
2010
133views more  IAJIT 2010»
15 years 2 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
CSMR
2010
IEEE
14 years 11 months ago
ROMULUS: Domain Driven Design and Mashup Oriented Development Based on Open Source Java Metaframework for Pragmatic, Reliable an
Web software development is one of the most active areas and fastest growing industries in software and services development in Europe, and, in particular, Java Enterprise Edition ...
Boni García, Juan C. Dueñas, Jos&eac...