Sciweavers

50 search results - page 6 / 10
» From Play-In Scenarios to Code: An Achievable Dream
Sort
View
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 3 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
ICWE
2005
Springer
15 years 3 months ago
A Model-Based Approach for Integrating Third Party Systems with Web Applications
New Web applications are rapidly moving from stand-alone systems to distributed applications that need to interoperate with third party systems, such as external Web services or le...
Nathalie Moreno, Antonio Vallecillo
CCS
2000
ACM
15 years 1 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
INFOCOM
2003
IEEE
15 years 2 months ago
An information theoretic view of network management
—We present an information-theoretic framework for network management for recovery from nonergodic link failures. Building on recent work in the field of network coding, we desc...
Tracey Ho, Muriel Médard, Ralf Koetter
CISS
2007
IEEE
15 years 3 months ago
Routing Strategies in Broadband Multihop Cooperative Networks
— Two fundamental properties of wireless networks, the variable link quality and the broadcast nature of the transmission, have often been ignored in the design of routing protoc...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.