Sciweavers

2337 search results - page 384 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ACSW
2004
13 years 9 months ago
Developing and Delivering a Software Internationalisation Subject
This paper describes the content and delivery of a software internationalisation subject (ITN677) that was developed for Master of Information Technology (MIT) students in the Fac...
Tony Sahama, Chris Ho-Stuart, James M. Hogan
ASE
2005
102views more  ASE 2005»
13 years 7 months ago
Modular Verification of Open Features Using Three-Valued Model Checking
Feature-oriented programming organizes programs around features rather than objects, thus better supporting extensible, product-line architectures. Programming languages increasin...
Harry C. Li, Shriram Krishnamurthi, Kathi Fisler
ISW
2009
Springer
14 years 2 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
MINENET
2006
ACM
14 years 1 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
WWW
2009
ACM
14 years 8 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...