warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
142views more  TPDS 2010»
12 years 3 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
138views more  CCR 1999»
12 years 5 months ago
Context-agile encryption for high speed communication networks
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
12 years 5 months ago
Security Implications of Typical Grid Computing Usage Scenarios
A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to these...
Marty Humphrey, Mary R. Thompson
107views more  TSE 2008»
12 years 5 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
12 years 5 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
96views more  CSI 2007»
12 years 5 months ago
A common criteria based security requirements engineering process for the development of secure information systems
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
Daniel Mellado, Eduardo Fernández-Medina, M...
88views more  IJISEC 2006»
12 years 5 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
115views Business» more  BDIM 2007»
12 years 5 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
115views Database» more  DBSEC 1998»
12 years 7 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
12 years 7 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica