Sciweavers

3811 search results - page 35 / 763
» The Safe-Tcl Security Model
Sort
View
SP
2000
IEEE
15 years 4 months ago
Security and Source Code Access: Issues and Realities
This position paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source cod...
Steven B. Lipner
DSRT
1999
IEEE
15 years 4 months ago
Design and Implementation of a Distributed Interactive Simulation Security Architecture
The paper describes the design and implementation of a security architecture for a HLA/RTI prototype developed at ONERA/CERT. The major security objective is to protect the intell...
Pierre Bieber, Pierre Siron
IDTRUST
2010
ACM
15 years 6 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
COMPSAC
2006
IEEE
15 years 5 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
NSPW
2004
ACM
15 years 5 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley