Sciweavers

902 search results - page 67 / 181
» Security and Trust Requirements Engineering
Sort
View
CHI
2007
ACM
15 years 10 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
ENTCS
2008
390views more  ENTCS 2008»
14 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
SIGECOM
2005
ACM
113views ECommerce» more  SIGECOM 2005»
15 years 3 months ago
Dynamic and secure B2B e-contract update management
Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Imp...
Samuil Angelov, Sven Till, Paul W. P. J. Grefen
ATC
2007
Springer
15 years 4 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...
FSTTCS
2009
Springer
15 years 4 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...