Sciweavers

4330 search results - page 106 / 866
» Analyzing security architectures
Sort
View
136
Voted
ESCIENCE
2005
IEEE
15 years 10 months ago
GAMA: Grid Account Management Architecture
Security is a critical component of grid systems and while there are numerous software components and tools that provide some capabilities relating to security, there are few comp...
Karan Bhatia, Sandeep Chandra, Kurt Mueller
174
Voted
FSTTCS
2010
Springer
15 years 2 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 12 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
WICSA
2004
15 years 6 months ago
An Externalized Infrastructure for Self-Healing Systems
Software architecture descriptions can play a wide variety of roles in the software lifecycle, from requirements specification, to logical design, to implementation architectures....
David S. Wile, Alexander Egyed
LAWEB
2005
IEEE
15 years 10 months ago
Web Development Evolution: The Assimilation of Web Engineering Security
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security iss...
William Bradley Glisson, Ray Welland