Sciweavers

3003 search results - page 31 / 601
» Software Security: Building Security In
Sort
View
VLDB
1994
ACM
120views Database» more  VLDB 1994»
13 years 11 months ago
An Approach for Building Secure Database Federations
Dirk Jonscher, Klaus R. Dittrich
JCS
2006
74views more  JCS 2006»
13 years 7 months ago
On the impossibility of building secure Cliques-type authenticated group key agreement protocols
The A-GDH.2 and SA-GDH.2 authenticated group key agreement
Olivier Pereira, Jean-Jacques Quisquater
FOSSACS
2005
Springer
14 years 1 months ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
CCS
2009
ACM
14 years 2 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...