Sciweavers

3792 search results - page 3 / 759
» Techniques for Trusted Software Engineering
Sort
View
VMCAI
2004
Springer
13 years 10 months ago
Security, Protocols, and Trust
Joshua D. Guttman
TAPSOFT
1995
Springer
13 years 8 months ago
Can you Trust your Data?
Peter Ørbæk
RE
2009
Springer
13 years 11 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
ICSE
2007
IEEE-ACM
14 years 5 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...