Sciweavers

8644 search results - page 74 / 1729
» On the Composition of Secure Systems
Sort
View
POPL
2000
ACM
14 years 1 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
ACSAC
2005
IEEE
14 years 2 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
CCS
2009
ACM
14 years 1 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
JWSR
2007
183views more  JWSR 2007»
13 years 9 months ago
Behaviour-Aware Discovery of Web Service Compositions
: A major challenge for Service–oriented Computing is how to discover and compose (Web) services to build complex applications. We present a matchmaking system that exploits both...
Antonio Brogi, Sara Corfini
EUROMICRO
2006
IEEE
14 years 3 months ago
Composing Components in Design Phase using Exogenous Connectors
Composition can take place during different stages of component life cycle. We identify two main stages : design phase - components are composed into composite components for reus...
Kung-Kiu Lau, Ling Ling, Zheng Wang