Sciweavers

2517 search results - page 62 / 504
» Secure Deployment of Components
Sort
View
87
Voted
COMPSAC
2005
IEEE
15 years 8 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
103
Voted
SPW
2004
Springer
15 years 8 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
120
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Component adaptation and assembly using interface relations
Software’s expense owes partly to frequent reimplementation of similar functionality and partly to maintenance of patches, ports or components targeting evolving interfaces. Mor...
Stephen Kell
113
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
119
Voted
ECOOP
2005
Springer
15 years 8 months ago
Towards a Meta-Modelling Approach to Configurable Middleware
Abstract. In our research we are studying how to combine modelling, metamodelling, and reflection to systematically generate middleware configurations that can be targeted at diffe...
Nelly Bencomo, Gordon S. Blair, Geoff Coulson, Tha...