Sciweavers

8644 search results - page 65 / 1729
» On the Composition of Secure Systems
Sort
View
ACSAC
2001
IEEE
14 years 19 days ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
CCS
2004
ACM
14 years 2 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
SP
2008
IEEE
127views Security Privacy» more  SP 2008»
14 years 3 months ago
Civitas: Toward a Secure Voting System
Civitas is the first electronic voting system that is coercion-resistant, universally and voter verifiable, and suitable for remote voting. This paper describes the design and i...
Michael R. Clarkson, Stephen Chong, Andrew C. Myer...
GCC
2003
Springer
14 years 2 months ago
Interaction Compatibility: An Essential Ingredient for Service Composition
Common to Grid services, Web Services, software agents and software components is that they are independently built and provide services aimed for composition. A key issue is wheth...
Jun Han
ASE
1999
126views more  ASE 1999»
13 years 8 months ago
Behaviour Analysis of Distributed Systems Using the Tracta Approach
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
Dimitra Giannakopoulou, Jeff Kramer, Shing-Chi Che...