Sciweavers

12637 search results - page 207 / 2528
» Security for Extensible Systems
Sort
View
CCS
2003
ACM
14 years 2 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
SEC
2001
13 years 11 months ago
Extended Description Techniques for Security Engineering
There is a strong demand for techniques to aid development and modelling of security critical systems. Based on general security evaluation criteria, we show how to extend the syst...
Guido Wimmel, Alexander K. Wißpeintner
ACSAC
2005
IEEE
14 years 3 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
WORDS
2005
IEEE
14 years 3 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
APSEC
2006
IEEE
14 years 3 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan