Sciweavers

8644 search results - page 32 / 1729
» On the Composition of Secure Systems
Sort
View
TSE
2010
120views more  TSE 2010»
13 years 6 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
WSC
2007
13 years 10 months ago
Exploiting web service techniques for composing simulation models
Two basic approaches to simulation model composition can be distinguished, depending on whether the unit of composition is a model specification according to a certain modeling f...
Mathias Röhl, Florian Marquardt, Adelinde M. ...
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
ECBS
2000
IEEE
97views Hardware» more  ECBS 2000»
14 years 2 days ago
Ensuring Structure and Behavior Correctness in Design Composition
The design of a large component-based software system typically involves the composition of different components. Instead of relying on a free composition of components, we advoca...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
CL
2006
Springer
13 years 7 months ago
Tailorable language for behavioral composition and configuration of software components
Many software systems suffer from missing support for behavioral (runtime) composition and configuration of software components. The concern "behavioral composition and confi...
Uwe Zdun