Sciweavers

4731 search results - page 136 / 947
» Securing Interactive Programs
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 9 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
SBP
2012
Springer
12 years 4 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
ICCS
2005
Springer
14 years 2 months ago
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coar...
Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Youn...
SAS
2004
Springer
132views Formal Methods» more  SAS 2004»
14 years 2 months ago
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language
Abstract. This paper addresses the problem of checking programs written in an object-oriented language to ensure that they satisfy the information flow policies, confidentiality ...
Qi Sun, Anindya Banerjee, David A. Naumann