Sciweavers

4731 search results - page 81 / 947
» Securing Interactive Programs
Sort
View
CSFW
2006
IEEE
14 years 16 days ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
CRISIS
2009
13 years 10 months ago
Modeling dependencies in security risk management
This paper develops a framework for analyzing security risk dependencies in organizations and ranking the risks. The framework captures how risk `diffuses' via complex interac...
Tansu Alpcan, Nicholas Bambos
ICALP
2003
Springer
14 years 2 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
LISA
2008
13 years 11 months ago
Authentication on Untrusted Remote Hosts with Public-Key Sudo
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
Matthew Burnside, Mack Lu, Angelos D. Keromytis
GPCE
2008
Springer
13 years 10 months ago
On the modularity of feature interactions
Feature modules are the building blocks of programs in software product lines (SPLs). A foundational assumption of feature-based program synthesis is that features are composed in...
Chang Hwan Peter Kim, Christian Kästner, Don ...