Sciweavers

3003 search results - page 551 / 601
» Software Security: Building Security In
Sort
View
ISSA
2004
13 years 10 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
NSDI
2004
13 years 10 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
ECIS
2000
13 years 10 months ago
Citizen Information Services using Internet Technologies
This paper presents a Web-based, database-oriented set of applications, namely "Public Information" and "Electronic Voting", to support information services (ex...
Christos Bouras, Spyridon Kastaniotis, Vassilis Tr...
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
13 years 9 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
DLS
2008
264views Languages» more  DLS 2008»
13 years 9 months ago
Contextual values
Context-oriented programming proposes to treat execution context explicitly and to provide means for context-dependent adaptation at runtime. There are many mechanisms that can be...
Éric Tanter