Sciweavers

2281 search results - page 33 / 457
» Security Patterns and Secure Systems Design
Sort
View
ATAL
2003
Springer
14 years 3 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
WWW
2010
ACM
14 years 4 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
ACMSE
2006
ACM
14 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
CCS
2007
ACM
14 years 4 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
ACSAC
2005
IEEE
14 years 3 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner