Sciweavers

5843 search results - page 203 / 1169
» Software Security in Practice
Sort
View
CCS
2010
ACM
15 years 11 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 11 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
152
Voted
JSS
2007
104views more  JSS 2007»
15 years 4 months ago
Institutionalization of software product line: An empirical investigation of key organizational factors
A good fit between the person and the organization is essential in a better organizational performance. This is even more crucial in case of institutionalization of a software pr...
Faheem Ahmed, Luiz Fernando Capretz, Shahbaz Ali S...
125
Voted
ACSAC
1999
IEEE
15 years 9 months ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...
HAIS
2008
Springer
15 years 6 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo