Sciweavers

2257 search results - page 145 / 452
» Secure program partitioning
Sort
View
97
Voted
IFIP
1994
Springer
15 years 4 months ago
Reflections on Security of Database and Datatransfer Systems in Health Care
Health care is a complex and transnational task of societies. The various institutions and individuals involved are not and should not be governed by one central authority, but ha...
Joachim Biskup, Gerrit Bleumer
99
Voted
ATAL
2006
Springer
15 years 4 months ago
Security in multiagent systems by policy randomization
Security in multiagent systems is commonly defined as the ability of the system to deal with intentional threats from other agents. This paper focuses on domains where such intent...
Praveen Paruchuri, Milind Tambe, Fernando Ord&oacu...
MMMACNS
2001
Springer
15 years 5 months ago
Analyzing Separation of Duties in Petri Net Workflows
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
Konstantin Knorr, Harald Weidner
122
Voted
APLAS
2011
ACM
14 years 18 days ago
Decentralized Delimited Release
Abstract. Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide suppor...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
105
Voted
ER
2009
Springer
166views Database» more  ER 2009»
15 years 7 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone