Sciweavers

1587 search results - page 115 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
CSFW
2008
IEEE
15 years 11 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 8 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
IEEEARES
2008
IEEE
15 years 11 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
GIL
2010
15 years 2 months ago
Light Competition in Chinese Cabbage/Maize Strip Intercropping Systems
: Due to drastic socio-economic changes traditional intercropping systems in China are endangered. New high yielding intercropping systems that can easily be mechanized have to be ...
Til Feike, Sebastian Munz, Simone Graeff-Hönn...
USS
2004
15 years 6 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...