Sciweavers

8644 search results - page 76 / 1729
» On the Composition of Secure Systems
Sort
View
SMC
2007
IEEE
15 years 11 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
CCS
2010
ACM
15 years 11 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
16 years 6 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
CAINE
2003
15 years 6 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
HYBRID
2005
Springer
15 years 10 months ago
Bisimulation for Communicating Piecewise Deterministic Markov Processes (CPDPs)
Abstract. CPDPs (Communicating Piecewise Deterministic Markov Processes) can be used for compositional specification of systems from the class of stochastic hybrid processes forme...
Stefan Strubbe, A. J. van der Schaft