Sciweavers

2213 search results - page 129 / 443
» Software Security
Sort
View
128
Voted
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
148
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 8 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
109
Voted
OOPSLA
2007
Springer
15 years 9 months ago
CASE-FX: feature modeling support in an OO Case tool
Generative Programming advocates developing a family of systems rather than a set of single systems. Feature modeling can assist in supporting the development of such software pro...
Alain Forget, Dave Arnold, Sonia Chiasson
117
Voted
CISIS
2010
IEEE
15 years 10 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
135
Voted
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 7 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider