Sciweavers

2517 search results - page 141 / 504
» Secure Deployment of Components
Sort
View
106
Voted
CCS
2004
ACM
15 years 9 months ago
Verifying policy-based security for web services
WS-SecurityPolicy is a declarative configuration language for driving web services security mechanisms. We describe a formal sefor WS-SecurityPolicy, and propose a more abstract ...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
126
Voted
ACISP
1998
Springer
15 years 7 months ago
LITESET: A Light-Weight Secure Electronic Transaction Protocol
Abstract. The past few years have seen the emergence of a large number of proposals for electronic payments over open networks. Among these proposals is the Secure Electronic Trans...
Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
112
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Information Security: Science, Pseudoscience, and Flying Pigs
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
Roger R. Schell
130
Voted
AAAI
2010
15 years 5 months ago
Security Games with Arbitrary Schedules: A Branch and Price Approach
Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms use...
Manish Jain, Erim Kardes, Christopher Kiekintveld,...
145
Voted
TOPLAS
2008
101views more  TOPLAS 2008»
15 years 3 months ago
Verifying policy-based web services security
WS-SecurityPolicy is a declarative language for configuring web services security mechanisms. We describe a formal semantics for WS-SecurityPolicy and propose a more abstract lang...
Karthikeyan Bhargavan, Cédric Fournet, Andr...