Sciweavers

276 search results - page 18 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
ICICS
1997
Springer
15 years 1 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
69
Voted
ISSRE
2007
IEEE
14 years 11 months ago
Testing Security Policies: Going Beyond Functional Testing
While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper i...
Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry
87
Voted
COMPSAC
2006
IEEE
15 years 1 months ago
A Service-Oriented Design Framework for Secure Network Applications
Abstract---Service Oriented Architecture (SOA) is an architectural style to reuse and integrate existing systems for designing new applications. Each application is designed in an ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
CMS
2003
171views Communications» more  CMS 2003»
14 years 11 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CODES
2003
IEEE
15 years 2 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang