Sciweavers

6137 search results - page 205 / 1228
» Securing Collaborative Applications
Sort
View
113
Voted
ANSOFT
2002
111views more  ANSOFT 2002»
15 years 2 months ago
Using UML Profiles for Documenting Web-Based Application Frameworks
Abstract. The Web now offers an exceptional infrastructure for the development of distributed collaborative services and applications. However, most of the existing applications on...
Lidia Fuentes, José M. Troya, Antonio Valle...
IFIP
2009
Springer
15 years 9 months ago
Specifying and Modelling Secure Channels in Strand Spaces
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol ed on top of a secure transport protocol. The model abst...
Allaa Kamil, Gavin Lowe
146
Voted
IDTRUST
2009
ACM
15 years 9 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
123
Voted
ICST
2008
IEEE
15 years 8 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
CCS
2008
ACM
15 years 4 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee