Sciweavers

222 search results - page 8 / 45
» Trust Trade-off Analysis for Security Requirements Engineeri...
Sort
View
IJSN
2006
124views more  IJSN 2006»
14 years 11 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
82
Voted
ITRUST
2004
Springer
15 years 5 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
WS
2004
ACM
15 years 5 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
AOSD
2004
ACM
15 years 5 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
COMPSAC
2008
IEEE
15 years 6 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu