Sciweavers

3003 search results - page 215 / 601
» Software Security: Building Security In
Sort
View
144
Voted
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
15 years 9 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
143
Voted
OOPSLA
2005
Springer
15 years 10 months ago
Improving architecture testability with patterns
There is a critical need for approaches to support software testing. Our research exploits the information described at Architectural Patterns to drive the definition of tests. As...
Roberta Coelho, Uirá Kulesza, Arndt von Sta...
177
Voted
ICICS
2009
Springer
15 years 11 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
149
Voted
ISORC
2005
IEEE
15 years 10 months ago
Adaptable Situation-Aware Secure Service-Based (AS3) Systems
Service-based systems have many applications, including collaborative research and development, e-business, health care, environmental control, military applications, and homeland...
Stephen S. Yau, Hasan Davulcu, Supratik Mukhopadhy...
WCRE
2005
IEEE
15 years 10 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean