Sciweavers

3811 search results - page 72 / 763
» The Safe-Tcl Security Model
Sort
View
ICUMT
2009
14 years 9 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
CSUR
2010
200views more  CSUR 2010»
14 years 9 months ago
Business process modeling languages: Sorting through the alphabet soup
Hafedh Mili, Guy Tremblay, Guitta Bou Jaoude, Eric...
ICON
2007
IEEE
15 years 6 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
POPL
2004
ACM
16 years 6 days ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
CSFW
2005
IEEE
15 years 5 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook