Sciweavers

2236 search results - page 183 / 448
» Secure Software Design in Practice
Sort
View
132
Voted
CSFW
2010
IEEE
15 years 8 months ago
Towards a Formal Foundation of Web Security
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
EUROCRYPT
2008
Springer
15 years 5 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
CSMR
2002
IEEE
15 years 9 months ago
Evolution of a Software Component - Experiences with a Network Editor Component
Even though the benefits of component-based software development are widely accepted, they are easily overestimated. To provide a firmer basis for the general discussion we descri...
Jyrki Akkanen, Attila Kiss, Jukka K. Nurminen
WOSP
2004
ACM
15 years 9 months ago
Performance modeling from software components
When software products are assembled from pre-defined components, performance prediction should be based on the components also. This supports rapid model-building, using previous...
Xiuping Wu, C. Murray Woodside
C3S2E
2008
ACM
15 years 5 months ago
Concurrent software engineering: preparing for paradigm shift
Software systems bridge the gap between information processing needs and available computer hardware. As system requirements grow in complexity and hardware evolves, the gap does ...
Peter Grogono, Brian Shearing