Sciweavers

2213 search results - page 159 / 443
» Software Security
Sort
View
155
Voted
ISSRE
2010
IEEE
15 years 2 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
128
Voted
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 10 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
137
Voted
WS
2006
ACM
15 years 9 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
114
Voted
NCA
2006
IEEE
15 years 9 months ago
A System for Secure IP Telephone Conferences
We present a system for secure telephone conferences (stc) over the internet. The system ensures participant authentication via x.509 certificates, such that every participant of...
Axel Treßel, Jorg Keller
139
Voted
ECOOP
2003
Springer
15 years 8 months ago
Open APIs for Embedded Security
Abstract. Embedded computer control is increasingly common in appliances, vehicles, communication devices, medical instruments, and many other systems. Some embedded computer syste...
Carl A. Gunter