Sciweavers

716 search results - page 42 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
CSFW
1998
IEEE
14 years 1 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider
WOWMOM
2005
ACM
106views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
A Framework for Dynamic Service Composition
To be able to utilize the generative potential of future networks for service composition, the attributes of services and networks must be appropriately formalized, stored and mad...
Paramai Supadulchai, Finn Arve Aagesen
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
AISM
2004
13 years 10 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
ECMDAFA
2006
Springer
142views Hardware» more  ECMDAFA 2006»
14 years 14 days ago
Ontology-Based Composition and Transformation for Model-Driven Service Architecture
Building service-based architectures has become a major area of interest since the advent of Web services. Modelling these architectures is a central activity. Model-driven archite...
Claus Pahl