Sciweavers

2236 search results - page 77 / 448
» Secure Software Design in Practice
Sort
View
121
Voted
SI3D
1995
ACM
15 years 6 months ago
Object Associations: A Simple and Practical Approach to Virtual 3D Manipulation
This paper describes a software framework to aid in designing and implementing convenient manipulation behaviors for objects in a 3D virtual environment. A combination of almost r...
Richard W. Bukowski, Carlo H. Séquin
108
Voted
STORAGESS
2006
ACM
15 years 8 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
163
Voted
TRUSTBUS
2007
Springer
15 years 8 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
115
Voted
APSEC
2003
IEEE
15 years 8 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
120
Voted
CCS
2007
ACM
15 years 8 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...