Sciweavers

5722 search results - page 69 / 1145
» Security Function Interactions
Sort
View
POLICY
2007
Springer
14 years 2 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
GRID
2005
Springer
14 years 2 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
IEEEARES
2006
IEEE
14 years 2 months ago
Towards a Security Architecture for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security i...
Klaus Plößl, Thomas Nowey, Christian Ml...
AOSD
2004
ACM
14 years 2 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ESORICS
2006
Springer
14 years 13 days ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...