Sciweavers

3811 search results - page 124 / 763
» The Safe-Tcl Security Model
Sort
View
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
15 years 10 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...
CCS
2010
ACM
15 years 2 months ago
Cap unification: application to protocol security modulo homomorphic encryption
We address the insecurity problem for cryptographic protocols, for an active intruder and a bounded number of sessions. The protocol steps are modeled as rigid Horn clauses, and t...
Siva Anantharaman, Hai Lin, Christopher Lynch, Pal...
IJNSEC
2010
100views more  IJNSEC 2010»
14 years 11 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao
140
Voted
APSCC
2009
IEEE
15 years 11 months ago
Security meta-services orchestration architecture
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunit...
Aymen Baouab, Olivier Perrin, Nicolas Biri, Claude...
COLCOM
2007
IEEE
15 years 11 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...