Sciweavers

902 search results - page 65 / 181
» Security and Trust Requirements Engineering
Sort
View
EUROPKI
2009
Springer
14 years 7 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
FC
2006
Springer
108views Cryptology» more  FC 2006»
15 years 1 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
ICICS
2009
Springer
15 years 4 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
ICSE
2009
IEEE-ACM
14 years 7 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 4 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...