Sciweavers

81 search results - page 2 / 17
» Verifiable Identifiers in Middleware Security
Sort
View
IEEEARES
2006
IEEE
13 years 11 months ago
Secure and Reliable Java-Based Middleware - Challenges and Solutions
Java and the Java Virtual Machine (JVM) are a predominant programming language and deployment platform for complex, component-oriented systems. In current standard Java runtime sy...
Walter Binder
SAFECOMP
1998
Springer
13 years 9 months ago
Refinement of Safety-Related Hazards into Verifiable Code Assertions
: This paper presents a process for the stepwise refinement of safety code assertions from identified system hazards. The code assertions are intended for use in system safety veri...
Ken Wong, Jeff Joyce
MSR
2010
ACM
13 years 7 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
WWW
2011
ACM
13 years 8 days ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
GI
2009
Springer
13 years 9 months ago
Classifying Privacy and Verifiability Requirements for Electronic Voting
Abstract: Voter privacy and verifiability are fundamental security concepts for electronic voting. Existing literature on electronic voting provides many definitions and interpreta...
Lucie Langer, Axel Schmidt, Melanie Volkamer, Joha...