Sciweavers

550 search results - page 66 / 110
» A lightweight approach to state based security testing
Sort
View
SACMAT
2010
ACM
15 years 2 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
IFIP
2009
Springer
14 years 7 months ago
Finite Models in FOL-Based Crypto-Protocol Verification
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
Jan Jürjens, Tjark Weber
ISCAS
2006
IEEE
155views Hardware» more  ISCAS 2006»
15 years 3 months ago
Design and evaluation of steganography for voice-over-IP
—According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-...
Christian Krätzer, Jana Dittmann, Thomas Voge...
CCS
2009
ACM
15 years 1 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
PTS
2008
100views Hardware» more  PTS 2008»
14 years 11 months ago
Model-Based Generation of Testbeds for Web Services
Abstract. A Web Service is commonly not an independent software entity, but plays a role in some business process. Hence, it depends on the services provided by external Web Servic...
Antonia Bertolino, Guglielmo De Angelis, Lars Fran...