Sciweavers

8503 search results - page 273 / 1701
» Secure Software Architectures
Sort
View
123
Voted
FASE
2009
Springer
15 years 11 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
CCS
2006
ACM
15 years 8 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
WPES
2006
ACM
15 years 10 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
ACSAC
2001
IEEE
15 years 8 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
ECBS
2007
IEEE
98views Hardware» more  ECBS 2007»
15 years 11 months ago
A Process Module to Pre-Process Requirements for Architecting
Software architectures have a significant impact on software quality. However, building architectures is a non-trivial task. In this paper, we present a process module for pre-pro...
Matthias Galster, Armin Eberlein, Mahmood Moussavi