Sciweavers

181 search results - page 21 / 37
» Automated Verification of UMLsec Models for Security Require...
Sort
View
CAV
2010
Springer
168views Hardware» more  CAV 2010»
14 years 10 months ago
A Dash of Fairness for Compositional Reasoning
Abstract. Proofs of progress properties often require fairness assumptions. Incorporating global fairness assumptions in a compositional method is a challenge, however, given the l...
Ariel Cohen 0002, Kedar S. Namjoshi, Yaniv Sa'ar
106
Voted
CCS
2008
ACM
15 years 2 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
97
Voted
FLOPS
2006
Springer
15 years 4 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
ESORICS
2011
Springer
14 years 5 days ago
A Systematic Analysis of XSS Sanitization in Web Application Frameworks
While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization remains the industry-standard d...
Joel Weinberger, Prateek Saxena, Devdatta Akhawe, ...
105
Voted
OOPSLA
2000
Springer
15 years 4 months ago
A real world object modeling method for creating simulation environment of real-time systems
Most real-time embedded control software feature complex interactions with asynchronous inputs and environment objects, and a meaningful simulation of a real-time control software...
Ji Y. Lee, Hye J. Kim, Kyo Chul Kang