Sciweavers

5843 search results - page 190 / 1169
» Software Security in Practice
Sort
View
SEDE
2010
15 years 2 months ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 1 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 4 months ago
Building Reusable Software Component For Optimization Check in ABAP Coding
Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes...
P. Shireesha, S. S. V. N. Sharma
ICNP
2006
IEEE
15 years 10 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay