Sciweavers

3811 search results - page 77 / 763
» The Safe-Tcl Security Model
Sort
View
EPEW
2005
Springer
15 years 5 months ago
Choreographing Security and Performance Analysis for Web Services
We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from ...
Stephen Gilmore, Valentin Haenel, Leïla Kloul...
ISW
2007
Springer
15 years 6 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
IEEEARES
2006
IEEE
15 years 6 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
14 years 11 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg
ICSR
2011
Springer
14 years 3 months ago
Software Reuse and Safety
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
William B. Frakes, John M. Favaro