Sciweavers

2236 search results - page 114 / 448
» Secure Software Design in Practice
Sort
View
EUROPKI
2004
Springer
15 years 9 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
CORR
2008
Springer
68views Education» more  CORR 2008»
15 years 4 months ago
Impact of Vehicular Communications Security on Transportation Safety
Transportation safety, one of the main driving forces of the development of vehicular communication (VC) systems, relies on high-rate safety messaging (beaconing). At the same time...
Panos Papadimitratos, Giorgio Calandriello, Jean-P...
WCRE
2005
IEEE
15 years 10 months ago
Diagnosing Design Problems in Object Oriented Systems
Software decay is a phenomenon that plagues aging software systems. While in recent years, there has been significant progress in the area of automatic detection of “code smells...
Adrian Trifu, Radu Marinescu
EUROSYS
2007
ACM
16 years 1 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
ESSOS
2010
Springer
16 years 1 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer