Sciweavers

741 search results - page 93 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
CCS
2009
ACM
16 years 4 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 7 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
SAC
2004
ACM
15 years 9 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
ICIW
2007
IEEE
15 years 10 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
132
Voted
CONCUR
2010
Springer
15 years 5 months ago
A Theory of Design-by-Contract for Distributed Multiparty Interactions
Reliability is a critical issue in many multi-organizational distributed applications, be they web services, financial protocols, scientific computing infrastructure, and software ...
Laura Bocchi, Kohei Honda, Emilio Tuosto, Nobuko Y...