Sciweavers

3605 search results - page 135 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
COMPUTER
2004
60views more  COMPUTER 2004»
13 years 8 months ago
Embedded System Security
Philip Koopman
COMPUTER
2006
64views more  COMPUTER 2006»
13 years 8 months ago
Can We Make Operating Systems Reliable and Secure?
Andrew S. Tanenbaum, Jorrit N. Herder, Herbert Bos
MODELS
2007
Springer
14 years 2 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
LISP
2002
81views more  LISP 2002»
13 years 7 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers
CSFW
2009
IEEE
14 years 2 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...