Sciweavers

12637 search results - page 14 / 2528
» Security for Extensible Systems
Sort
View
CCS
2008
ACM
13 years 9 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
IJSEKE
2007
50views more  IJSEKE 2007»
13 years 7 months ago
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology
Haralambos Mouratidis, Paolo Giorgini
ACISP
2006
Springer
13 years 11 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
SIGADA
2004
Springer
14 years 26 days ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis
CCECE
2006
IEEE
14 years 1 months ago
AOP Extension for Security Testing of Programs
The purpose of this paper is to use the aspect-oriented programming (AOP) paradigm for security testing. AOP allows security experts to develop and inject separate modules for con...
Nadia Belblidia, Mourad Debbabi, Aiman Hanna, Zhen...