Sciweavers

1770 search results - page 98 / 354
» Writing requirements in computer security
Sort
View
SACMAT
2006
ACM
14 years 3 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
ICALP
2005
Springer
14 years 2 months ago
Single-Key AIL-MACs from Any FIL-MAC
Abstract. We investigate a general paradigm for constructing arbitraryinput-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency para...
Ueli M. Maurer, Johan Sjödin
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 6 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
ACSAC
2009
IEEE
14 years 1 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
CHI
2006
ACM
14 years 9 months ago
Social visualization in software development
Most software development tools focus on supporting the primary technical work ? writing code, managing requirements, filing bugs, etc. Yet with large teams, managing the social a...
Jason B. Ellis, Catalina Danis, Christine Halverso...