Sciweavers

694 search results - page 27 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
IJNSEC
2008
110views more  IJNSEC 2008»
14 years 9 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
87
Voted
ASE
2007
121views more  ASE 2007»
14 years 9 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
ACSAC
2005
IEEE
15 years 3 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
WSC
1998
14 years 11 months ago
Criteria for Simulation Software Evaluation
In simulation software selection problems, packages are evaluated either on their own merits or in comparison with other packages. In either method, a list of criteria for evaluat...
Jalal Nikoukaran, Vlatka Hlupic, Ray J. Paul
IEEEARES
2006
IEEE
15 years 3 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...