Sciweavers

201 search results - page 10 / 41
» Tools to Support Secure Enterprise Computing
Sort
View
EDOC
2000
IEEE
14 years 1 months ago
Mapping Enterprise Events to the CORBA Notification Service
To satisfy the need for a wide range of enterprise modelling choices, it is necessary to have a rich set of processbased and role-based modelling concepts. It is also necessary to...
Shelby Abraham, Keith Duddy, Michael Lawley, Zoran...
ESORICS
2011
Springer
12 years 9 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
CSFW
1992
IEEE
14 years 1 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
CHI
2008
ACM
14 years 10 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...