Sciweavers

3003 search results - page 15 / 601
» Software Security: Building Security In
Sort
View
EUROCRYPT
2001
Springer
13 years 12 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
KBSE
2005
IEEE
14 years 1 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 22 days ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
CCS
2007
ACM
14 years 1 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
HOTOS
1997
IEEE
13 years 11 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley