Sciweavers

8503 search results - page 113 / 1701
» Secure Software Architectures
Sort
View
ICSOFT
2009
13 years 6 months ago
A Knowledge Base for Justified Information Security Decision-making
Daria Stepanova, Simon Edward Parkin, Aad P. A. va...
ACSAC
2009
IEEE
14 years 3 months ago
Java Security: A Ten Year Retrospective
— The first edition of Java (both the language and the platform) was released in 1995, which contained the all-ornothing security access model. A mid-1997 paper I published in IE...
Li Gong
ACSAC
1996
IEEE
14 years 1 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
EUROCRYPT
1997
Springer
14 years 1 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
ICWS
2003
IEEE
13 years 10 months ago
Access Control in Dynamic XML-Based Web-Services with X-RBAC
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...