Sciweavers

5119 search results - page 133 / 1024
» Security Privacy
Sort
View
CSFW
1999
IEEE
15 years 8 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
92
Voted
CSFW
2008
IEEE
15 years 10 months ago
Refinement Types for Secure Implementations
Jesper Bengtson, Karthikeyan Bhargavan, Céd...
HOST
2008
IEEE
15 years 10 months ago
Trustworthy System Security through 3-D Integrated Hardware
Ted Huffmire, Jonathan Valamehr, Timothy Sherwood,...
62
Voted
CCS
2007
ACM
15 years 10 months ago
Towards automated provisioning of secure virtualized networks
Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramas...
90
Voted
CCS
2007
ACM
15 years 10 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...