Sciweavers

14850 search results - page 147 / 2970
» The Security of
Sort
View
ESORICS
2009
Springer
14 years 10 months ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 4 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
IEEEARES
2007
IEEE
14 years 4 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt
IEEEARES
2007
IEEE
14 years 4 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath
CCS
2007
ACM
14 years 4 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...