Sciweavers

40 search results - page 1 / 8
» Secure Self-Certified COTS
Sort
View
WETICE
2000
IEEE
13 years 9 months ago
Secure Self-Certified COTS
With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing nu...
Mourad Debbabi, E. Giasson, Béchir Ktari, F...
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
13 years 4 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
COMPUTER
1998
75views more  COMPUTER 1998»
13 years 4 months ago
Security Control for COTS Components
Qun Zhong, Nigel Edwards
ICSE
2007
IEEE-ACM
14 years 4 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
SP
1999
IEEE
119views Security Privacy» more  SP 1999»
13 years 9 months ago
Hardening COTS Software with Generic Software Wrappers
Timothy Fraser, Lee Badger, Mark Feldman