Sciweavers

12637 search results - page 206 / 2528
» Security for Extensible Systems
Sort
View
107
Voted
COMPSAC
2010
IEEE
15 years 18 days ago
Challenges and Future Directions of Software Technology: Secure Software Development
Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure sy...
Bhavani M. Thuraisingham, Kevin W. Hamlen
114
Voted
GCC
2004
Springer
15 years 8 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
119
Voted
ACSW
2006
15 years 4 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt
134
Voted
COMSWARE
2008
IEEE
15 years 9 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
ENTCS
2006
145views more  ENTCS 2006»
15 years 2 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers