Sciweavers

89 search results - page 2 / 18
» Secure Composition of Insecure Components
Sort
View
FOCS
2010
IEEE
13 years 3 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
ASWEC
2005
IEEE
13 years 11 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
PERCOM
2010
ACM
13 years 4 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
COMPSAC
2003
IEEE
13 years 11 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han
ASWEC
2004
IEEE
13 years 9 months ago
A Process Framework for Characterising Security Properties of Component-Based Software Systems
This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
Khaled M. Khan, Jun Han