Sciweavers

1481 search results - page 205 / 297
» Enriching the Software Development Process by Formal Methods
Sort
View
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
CSFW
1993
IEEE
15 years 8 months ago
Abstract Machines for Communication Security
Machines for Communication Security Pierre Bieber, Nora Boulahia-Cuppens Thomas Lehmann, Erich van Wickeren ONERA-CERT CAP debis GEI 2 Av. E. Belin Oxfordstr. 12-16 F-31055, Toulou...
Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, ...
DEXAW
1998
IEEE
109views Database» more  DEXAW 1998»
15 years 8 months ago
Expressing Dynamics of Mobile Agent Systems Using Ambient Calculus
The mobile agent approach has become popular due to recent developments in the mobile code paradigm and enabling programming technologies. Many existing agentbased systems lack cl...
Peter Stañski, Arkady B. Zaslavsky
SIGSOFT
2007
ACM
16 years 4 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
NORDICHI
2004
ACM
15 years 9 months ago
Procuring a usable system using unemployed personas
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
Erik Markensten, Henrik Artman