Sciweavers

6555 search results - page 147 / 1311
» Secure attribute-based systems
Sort
View
ICEIS
2003
IEEE
15 years 7 months ago
Analysing Security Requirements of Information Systems Using Tropos
Haralambos Mouratidis, Gordon A. Manson, Abdullah ...
WSC
2004
15 years 3 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
ACSAC
2009
IEEE
15 years 6 months ago
Reflections on UNIX Vulnerabilities
The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded it...
Matt Bishop
DAC
2002
ACM
16 years 3 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
IFIP
2009
Springer
15 years 7 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith