Sciweavers

3003 search results - page 113 / 601
» Software Security: Building Security In
Sort
View
WETICE
1997
IEEE
14 years 2 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong
ACSAC
2001
IEEE
14 years 1 months ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler
IFIP
1998
Springer
14 years 2 months ago
Security Requirements for Mobile Agents in Electronic Markets
Abstract. In this article we identify security threats and requirements for software agent systems in the context of an electronic market. A short description of our own agent syst...
Michael Zapf, Helge Müller, Kurt Geihs
GI
2009
Springer
13 years 7 months ago
Sensor Integration in the Security Domain
: The Sensor Integration Package is a reusable subsystem, combining the complementary capabilities of radar, infra red and long range day light camera, laser, image processing soft...
Bastian Köhler, Kaeye Dästner, Felix Opi...
EUROMICRO
2009
IEEE
14 years 2 months ago
Multi-layered Virtual Machines for Security Updates in Grid Environments
The use of user specific virtual machines (VMs) in Grid and Cloud computing reduces the administration overhead associated with manually installing required software for every user...
Roland Schwarzkopf, Matthias Schmidt, Niels Fallen...