Sciweavers

288 search results - page 18 / 58
» Formal Analysis of Workflow Systems with Security Considerat...
Sort
View
FUIN
2006
69views more  FUIN 2006»
14 years 9 months ago
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Traditionally, due to efficiency considerations, when encrypting long messages using an asymmtric cryptosystem, one needs to use a symmetric cryptosystem in addition. To eliminate ...
Sheng Zhong
WWW
2004
ACM
15 years 10 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
ICSE
1993
IEEE-ACM
15 years 1 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan
IFM
2010
Springer
204views Formal Methods» more  IFM 2010»
14 years 8 months ago
Collaborative Modelling and Co-simulation in the Development of Dependable Embedded Systems
This paper presents initial results of research aimed at developing methods and tools for multidisciplinary collaborative development of dependable embedded systems. We focus on th...
John S. Fitzgerald, Peter Gorm Larsen, Ken Pierce,...
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
14 years 11 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...