Sciweavers

671 search results - page 42 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
VLDB
2006
ACM
122views Database» more  VLDB 2006»
15 years 10 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
KBSE
2007
IEEE
15 years 4 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 10 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
HYBRID
2007
Springer
15 years 1 months ago
Safety Verification of an Aircraft Landing Protocol: A Refinement Approach
Abstract. In this paper, we propose a new approach for formal verification of hybrid systems. To do so, we present a new refinement proof technique, a weak refinement using step in...
Shinya Umeno, Nancy A. Lynch
WMC
2004
224views ECommerce» more  WMC 2004»
14 years 11 months ago
Evaluation Framework for a Mobile Marketing Application in 3rd Generation Networks
: Testing of a software application serves the accomplishment of two dis tinct objectives: ensuring functionality and end-user acceptance. However, with an increasing desire for mo...
Franz Lehner, Eva-Maria Sperger, Holger Nösek...