Sciweavers

2281 search results - page 135 / 457
» Security Patterns and Secure Systems Design
Sort
View
100
Voted
HOST
2009
IEEE
15 years 7 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
103
Voted
SEFM
2007
IEEE
15 years 6 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
ACSAC
2004
IEEE
15 years 4 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
84
Voted
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 7 days ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
CCS
2007
ACM
15 years 6 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...