Sciweavers

SEC
2000
13 years 5 months ago
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
Yongge Wang
SEC
2000
13 years 5 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent
SEC
2000
13 years 5 months ago
Securing Mobile Agents for Electronic Commerce: An Experiment
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
SEC
2000
13 years 5 months ago
A Context-Sensitive Access Control Model and Prototype Implementation
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...
SEC
2000
13 years 5 months ago
A Flexible Management Framework for Certificate Status Validation
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
SEC
2003
13 years 5 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
SEC
2003
13 years 5 months ago
Assessing Security in Energy-Efficient Sensor Networks
In this paper, we describe why current research in ad hoc networks requires an effective assessment framework, and how our system profile proposal can be used for the purpose. W...
Yee Wei Law, Sandro Etalle, Pieter H. Hartel
SEC
2003
13 years 5 months ago
World Framework for Security Benchmark Changes
: The paper contains presentation of a framework, which would significantly increase quality of information security products and procedures, and Commentary on difficulties of impl...
Lech J. Janczewski, Andrew M. Colarik
SEC
2003
13 years 5 months ago
From Finite State Machines to Provably Correct Java Card Applets
Abstract This paper presents a systematic approach to developing Java Card applets and/or formal specifications for them, starting from descriptions in the form of finite state m...
Engelbert Hubbers, Martijn Oostdijk, Erik Poll