Sciweavers

3003 search results - page 27 / 601
» Software Security: Building Security In
Sort
View
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
14 years 1 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
AGENTS
2001
Springer
14 years 1 days ago
Specifying agent behavior as concurrent tasks
Software agents are currently the subject of much research in many interrelated fields. Unfortunately, there has not been enough emphasis on defining the techniques required to bu...
Scott A. DeLoach
ECSA
2010
Springer
13 years 7 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
WWW
2002
ACM
14 years 8 months ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp
CCS
2008
ACM
13 years 9 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...