Sciweavers

2281 search results - page 134 / 457
» Security Patterns and Secure Systems Design
Sort
View
107
Voted
SAFECOMP
2001
Springer
15 years 5 months ago
Designing Safety into Medical Decisions and Clinical Processes
After many years of experimental research software systems to support clinical decisionmaking are now moving into routine clinical practice. Most of the research to date has been ...
John Fox
ACSAC
2007
IEEE
15 years 7 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
115
Voted
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
15 years 7 months ago
Security Conscious Web Service Composition with Semantic Web Support
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web ...
Barbara Carminati, Elena Ferrari, Ryan Bishop, Pat...
90
Voted
EUROSEC
2009
ACM
15 years 7 months ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
137
Voted
CSFW
2009
IEEE
15 years 7 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...