Sciweavers

3504 search results - page 91 / 701
» Secure protocol composition
Sort
View
114
Voted
WICSA
2008
15 years 4 months ago
A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation
Service composition is one of the key objectives for adopting Service Oriented Architecture. Today, web services, however, are not always perfectly compatible and composition mism...
Xitong Li, Yushun Fan, Jian Wang, Li Wang, Feng Ji...
ENTCS
2010
99views more  ENTCS 2010»
15 years 2 months ago
Describing Secure Interfaces with Interface Automata
Interface automata are a model that allows for the representation of stateful interfaces. In this paper we introduce a variant of interface automata, which we call interface struc...
Matias Lee, Pedro R. D'Argenio
123
Voted
PROVSEC
2007
Springer
15 years 8 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
131
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
136
Voted
ESORICS
2008
Springer
15 years 4 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen