Sciweavers

2213 search results - page 50 / 443
» Software Security
Sort
View
FASE
2009
Springer
15 years 6 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
100
Voted
IRI
2006
IEEE
15 years 6 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
CASES
2009
ACM
15 years 6 months ago
Negotiation of security services: a multi-criteria decision approach
Antonio Vincenzo Taddeo, Pierpaolo Marcon, Alberto...
ICFEM
2005
Springer
15 years 5 months ago
A Theory of Secure Control Flow
Martín Abadi, Mihai Budiu, Úlfar Erl...
SEKE
2005
Springer
15 years 5 months ago
Formal Analysis of Workflow Systems with Security Considerations
Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi