Sciweavers

2236 search results - page 209 / 448
» Secure Software Design in Practice
Sort
View
OOPSLA
2005
Springer
15 years 9 months ago
Pattern transformation for two-dimensional separation of concerns
Design patterns are applied in software development to decouple individual concerns, so that a change in a design decision is isolated to one location of the code base. However, m...
Xiaoqing Wu
AAMAS
2007
Springer
15 years 3 months ago
Mechanisms for environments in multi-agent systems: Survey and opportunities
The environment has been recognized as an explicit and exploitable element to design Multi-Agent Systems (MAS). It can be assigned a number of responsibilities that would be more d...
Eric Platon, Marco Mamei, Nicolas Sabouret, Shinic...
CSFW
2006
IEEE
15 years 10 months ago
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL. This model is cryptographically sound in ...
Christoph Sprenger, Michael Backes, David A. Basin...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
MSWIM
2006
ACM
15 years 9 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...