Sciweavers

3792 search results - page 4 / 759
» Techniques for Trusted Software Engineering
Sort
View
EDBTW
2004
Springer
13 years 10 months ago
Query Answering in Peer-to-Peer Data Exchange Systems
The problem of answering queries posed to a peer who is a member of a peer-to-peerdataexchangesystemisstudied.Theanswershavetobeconsistentwrt to both the local semantic constraints...
Leopoldo E. Bertossi, Loreto Bravo
VMCAI
2004
Springer
13 years 10 months ago
History-Dependent Scheduling for Cryptographic Processes
Abstract. This paper presents history-dependent scheduling, a new technique for reducing the search space in the verification of cryptographic protocols. This technique allows the...
Vincent Vanackère
ICSE
2000
IEEE-ACM
13 years 9 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
SCAM
2007
IEEE
13 years 11 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
CISSE
2008
Springer
13 years 7 months ago
Modeling Trust in Wireless Ad-Hoc Networks
Tirthankar Ghosh, Hui Xu