Sciweavers

12637 search results - page 206 / 2528
» Security for Extensible Systems
Sort
View
COMPSAC
2010
IEEE
13 years 7 months ago
Challenges and Future Directions of Software Technology: Secure Software Development
Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure sy...
Bhavani M. Thuraisingham, Kevin W. Hamlen
GCC
2004
Springer
14 years 3 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
ACSW
2006
13 years 11 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
COMSWARE
2008
IEEE
14 years 4 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
ENTCS
2006
145views more  ENTCS 2006»
13 years 9 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers