Sciweavers

902 search results - page 15 / 181
» Security and Trust Requirements Engineering
Sort
View
ESORICS
1994
Springer
14 years 1 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
FOCS
2010
IEEE
13 years 7 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
ICSE
2004
IEEE-ACM
14 years 10 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
CCS
2010
ACM
13 years 8 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
ICCD
2002
IEEE
257views Hardware» more  ICCD 2002»
14 years 6 months ago
Requirements for Automotive System Engineering Tools
The requirements to system and software development tools brought up by the automotive industry differ from the requirements that other customers have. The important catchwords he...
Joachim Schlosser