Sciweavers

191 search results - page 10 / 39
» Systematic Security Analysis for Service-Oriented Software A...
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
ICIW
2007
IEEE
14 years 1 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
APSEC
2006
IEEE
14 years 1 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
ISM
2006
IEEE
112views Multimedia» more  ISM 2006»
14 years 1 months ago
Security Considerations for SOA-Based Multimedia Applications
Growing levels of digitalization and broadband access drives extremely fast progress in multimedia and networking technologies and allows consumers to create requirements at an ac...
Andrew Roczniak, Alexandre Miège, Abdulmota...
CCS
2007
ACM
14 years 1 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...