Sciweavers

1875 search results - page 61 / 375
» Modeling the Security of Steganographic Systems
Sort
View
TAPSOFT
1997
Springer
15 years 4 months ago
A Type-Based Approach to Program Security
This paper presents a type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property. With all program input...
Dennis M. Volpano, Geoffrey Smith
95
Voted
IEEESP
2007
98views more  IEEESP 2007»
15 years 19 days ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
109
Voted
SOUPS
2010
ACM
15 years 4 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
111
Voted
ENTCS
2006
151views more  ENTCS 2006»
15 years 21 days ago
Stochastic Simulation Methods Applied to a Secure Electronic Voting Model
We demonstrate a novel simulation technique for analysing large stochastic process algebra models, applying this to a secure electronic voting system example. By approximating the...
Jeremy T. Bradley, Stephen T. Gilmore
93
Voted
ATAL
2005
Springer
15 years 6 months ago
A secure architectural description language for agent systems
Multi-agent systems are now being considered a promising architectural approach for building Internet-based applications. One of the most critical and important aspects of softwar...
Haralambos Mouratidis, Manuel Kolp, Stéphan...