Sciweavers

8644 search results - page 76 / 1729
» On the Composition of Secure Systems
Sort
View
SMC
2007
IEEE
14 years 3 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
CCS
2010
ACM
14 years 3 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
14 years 10 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
CAINE
2003
13 years 10 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
HYBRID
2005
Springer
14 years 2 months ago
Bisimulation for Communicating Piecewise Deterministic Markov Processes (CPDPs)
Abstract. CPDPs (Communicating Piecewise Deterministic Markov Processes) can be used for compositional specification of systems from the class of stochastic hybrid processes forme...
Stefan Strubbe, A. J. van der Schaft