Sciweavers

101 search results - page 14 / 21
» Formal approach to security metrics.: what does
Sort
View
102
Voted
ICSE
2003
IEEE-ACM
16 years 20 days ago
From HCI to Software Engineering and Back
Methods to assess and ensure system usability are becoming increasingly important as market edge becomes less dependent on function and more dependent on ease of use, and as recog...
José Creissac Campos, Michael D. Harrison
112
Voted
FOSSACS
2009
Springer
15 years 7 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
130
Voted
SWS
2004
ACM
15 years 6 months ago
Creating non-decomposable stream bundles in multimedia web services using uSMIL
Technical advances in networks, operating systems and web based services are enabling new web-based services such as audiovisual surveillance, monitoring and recording of unfoldin...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
91
Voted
TLDI
2003
ACM
102views Formal Methods» more  TLDI 2003»
15 years 5 months ago
A typed interface for garbage collection
An important consideration for certified code systems is the interaction of the untrusted program with the runtime system, most notably the garbage collector. Most certified cod...
Joseph Vanderwaart, Karl Crary
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 5 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...