Sciweavers

1587 search results - page 63 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
144
Voted
CSFW
2009
IEEE
15 years 6 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
151
Voted
DAMON
2006
Springer
15 years 6 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
IWIA
2005
IEEE
15 years 8 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
112
Voted
GIS
1999
ACM
15 years 6 months ago
Specifying Analysis Patterns for Geographic Databases on the Basis of a Conceptual Framework
Frameworks and Patterns are important instruments that enable the reuse of successful software solutions in recurrent problems. Geographic information systems, on the other hand, ...
Jugurta Lisboa Filho, Cirano Iochpe