Sciweavers

4330 search results - page 100 / 866
» Analyzing security architectures
Sort
View
ESSOS
2011
Springer
14 years 8 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
146
Voted
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
15 years 7 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
CAISE
2003
Springer
15 years 10 months ago
An Administration Console for the CSAP System
Our group is involved in the European funded Webocracy project in which an e-government system called Webocrat has been designed and implemented. Our responsibility is to provide m...
Fredj Dridi, Björn Muschall, Günther Per...
SIGSOFT
2003
ACM
16 years 5 months ago
Making sense of runtime architecture for mobile phone software
We present a metamodel for runtime architecture and demonstrate with experimental results how this metamodel can be used to recover, analyze and improve runtime architecture of mo...
Alexander Ran, Raimondas Lencevicius
JSS
2010
111views more  JSS 2010»
15 years 3 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...