Sciweavers

1875 search results - page 75 / 375
» Modeling the Security of Steganographic Systems
Sort
View
92
Voted
OOPSLA
2000
Springer
15 years 4 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
135
Voted
ISSE
2010
14 years 11 months ago
An integrated multi-view model evolution framework
A UML model of a software system can be represented by a sequence of model transformations, starting from an empty model. To effectively support the design of complex systems, tra...
Volker Stolz
109
Voted
USS
2008
15 years 3 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
107
Voted
ENTCS
2010
99views more  ENTCS 2010»
15 years 26 days ago
Describing Secure Interfaces with Interface Automata
Interface automata are a model that allows for the representation of stateful interfaces. In this paper we introduce a variant of interface automata, which we call interface struc...
Matias Lee, Pedro R. D'Argenio
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
15 years 13 days ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg