Sciweavers

2429 search results - page 205 / 486
» Using Aspects to Design a Secure System
Sort
View
142
Voted
CCS
2011
ACM
14 years 3 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
107
Voted
CCS
2003
ACM
15 years 8 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
140
Voted
FLAIRS
2006
15 years 4 months ago
Using Activity Theory to Model Context Awareness: A Qualitative Case Study
In this paper, we describe an approach to modelling contextaware systems starting on the knowledge level. We make use of ideas from Activity Theory to structure the general contex...
Jörg Cassens, Anders Kofod-Petersen
115
Voted
CCS
2005
ACM
15 years 9 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
147
Voted
ER
2010
Springer
154views Database» more  ER 2010»
15 years 2 months ago
Modelling Functional Requirements in Spatial Design
Abstract. We demonstrate the manner in which high-level design requirements, e.g., as they correspond to the commonsensical conceptualisation of expert designers, may be formally s...
Mehul Bhatt, Joana Hois, Oliver Kutz, Frank Dylla