Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
This paper presents a CORBA Security discretionary prototype developed in the context of JaCoWeb Security Project. JaCoWeb Security Project is developing an authorization scheme f...
Carla Merkle Westphall, Joni da Silva Fraga, Miche...
Abstract-- Securely managing shared information in distributed environments across multiple organisations is a challenge. Distributed information management systems must be able to...
Martijn Warnier, Frances M. T. Brazier, Anja Oskam...