Sciweavers

2213 search results - page 149 / 443
» Software Security
Sort
View
183
Voted
FASE
2008
Springer
15 years 5 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
145
Voted
SPC
2005
Springer
15 years 9 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
139
Voted
COMSIS
2007
80views more  COMSIS 2007»
15 years 3 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
FOSSACS
2010
Springer
15 years 10 months ago
The Complexity of Synchronous Notions of Information Flow Security
The paper considers the complexity of verifying that a finite state system satisfies a number of definitions of information flow security. The systems model considered is one i...
Franck Cassez, Ron van der Meyden, Chenyi Zhang
IEEEARES
2009
IEEE
15 years 10 months ago
Web Service Trust: Towards a Dynamic Assessment Framework
— Trust in software services is a key prerequisite for the success and wide adoption of Services-Oriented Computing (SOC) in an open Internet world. However, trust is poorly asse...
George Spanoudakis, Stephane LoPresti