Sciweavers

2236 search results - page 122 / 448
» Secure Software Design in Practice
Sort
View
CORR
2007
Springer
114views Education» more  CORR 2007»
15 years 4 months ago
Design: One, but in different forms
This paper defends an augmented cognitively oriented "generic-design hypothesis": There are both significant similarities between the design activities implemented in sit...
Willemien Visser
WWW
2010
ACM
15 years 11 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
ESSOS
2010
Springer
16 years 1 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
HCI
2007
15 years 5 months ago
Tools to Increase the Strategic Value of User Experience Design
Case study describing tools and processes enabling accelerated adoption of Usability Standards, and increased efficiencies in development of accessible, internationalized, branded...
James E. Nieters, David Grabel, Vijay Agrawal
ASIACRYPT
2009
Springer
15 years 7 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...