Sciweavers

8644 search results - page 73 / 1729
» On the Composition of Secure Systems
Sort
View
OOPSLA
1997
Springer
14 years 1 months ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle
ICALP
2007
Springer
13 years 10 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
14 years 7 days ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek
IEEEARES
2007
IEEE
14 years 3 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt
SAC
2010
ACM
13 years 7 months ago
XTemplate 3.0: adding semantics to hypermedia compositions and providing document structure reuse
Hypermedia composite templates define generic structures of nodes and links that can be reused in different document compositions. The XTemplate language is an XML-based solutio...
Joel André Ferreira dos Santos, Débo...