Sciweavers

216 search results - page 2 / 44
» Security Measures and Weaknesses of the GPRS Security Archit...
Sort
View
IEEEARES
2006
IEEE
13 years 10 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
EUROPKI
2007
Springer
13 years 11 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
CCS
2008
ACM
13 years 6 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
ESEM
2009
ACM
13 years 11 months ago
Measuring the interplay of security principles in software architectures
Koen Buyens, Riccardo Scandariato, Wouter Joosen
INFOCOM
2008
IEEE
13 years 11 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan