-
2
-
-
0344146600
-
Making Components Contract Aware
-
Beugnard, A., Jézéquel, J.M., Plouzeau, N., Watkins, D.: Making Components Contract Aware. IEEE Computer 32 (1999) 38-45
-
(1999)
IEEE Computer
, vol.32
, pp. 38-45
-
-
Beugnard, A.1
Jézéquel, J.M.2
Plouzeau, N.3
Watkins, D.4
-
3
-
-
0032097883
-
A Map of Security Risks Associated with Using COTS
-
Lindqvist, U., Jonsson, E.: A Map of Security Risks Associated with Using COTS. IEEE Computer 31 (1998) 60-66
-
(1998)
IEEE Computer
, vol.31
, pp. 60-66
-
-
Lindqvist, U.1
Jonsson, E.2
-
5
-
-
0034872904
-
Trust-adapted enforcement of security policies in distributed component-structured applications
-
Hammamet, IEEE Computer Society Press
-
Herrmann, P., Krumm, H.: Trust-adapted enforcement of security policies in distributed component-structured applications. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, IEEE Computer Society Press (2001) 2-8
-
(2001)
Proceedings of the 6th IEEE Symposium on Computers and Communications
, pp. 2-8
-
-
Herrmann, P.1
Krumm, H.2
-
6
-
-
84904244303
-
State-Based Security Policy Enforcement in Component-Based E-Commerce Applications
-
Lisbon, Kluwer Academic Publisher
-
Herrmann, P., Wiebusch, L., Krumm, H.: State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. In: Proceedings of the 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E), Lisbon, Kluwer Academic Publisher (2002) 195-209
-
(2002)
Proceedings of the 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E)
, pp. 195-209
-
-
Herrmann, P.1
Wiebusch, L.2
Krumm, H.3
-
7
-
-
0032641892
-
Hardening COTS Software with Generic Software Wrappers
-
IEEE Computer Society Press
-
Fraser, T., Badger, L., Feldman, M.: Hardening COTS Software with Generic Software Wrappers. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press (1999) 2-16
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
8
-
-
34250724930
-
Trust-Based Protection of Software Component Users and Designers
-
Nixon, P., Terzis, S., eds.: Proceedings of the 1st International Conference on Trust Management. Heraklion, Springer-Verlag
-
Herrmann, P.: Trust-Based Protection of Software Component Users and Designers. In Nixon, P., Terzis, S., eds.: Proceedings of the 1st International Conference on Trust Management. LNCS 2692, Heraklion, Springer-Verlag (2003) 75-90
-
(2003)
LNCS
, vol.2692
, pp. 75-90
-
-
Herrmann, P.1
-
9
-
-
0007863633
-
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components
-
Canberra, IEEE Computer Society Press
-
Khan, K., Han, J., Zheng, Y.: A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. In: Proceedings of the Australian Software Engineering Conference (ASWEC'01), Canberra, IEEE Computer Society Press (2001) 117-126
-
(2001)
Proceedings of the Australian Software Engineering Conference (ASWEC'01)
, pp. 117-126
-
-
Khan, K.1
Han, J.2
Zheng, Y.3
-
11
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4 (2001) 224-274
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
0033691822
-
A Framework for Modeling Transfer Protocols
-
Herrmann, P., Krumm, H.: A Framework for Modeling Transfer Protocols. Computer Networks 34 (2000) 317-337
-
(2000)
Computer Networks
, vol.34
, pp. 317-337
-
-
Herrmann, P.1
Krumm, H.2
-
13
-
-
0001829728
-
Architecture and specification style in formal descriptions of distributed systems
-
Agarwal, S., Sabnani, K., eds.: Elsevier, IFIP
-
Vissers, C.A., Scollo, G., van Sinderen, M.: Architecture and specification style in formal descriptions of distributed systems. In Agarwal, S., Sabnani, K., eds.: Protocol Specification, Testing and Verification. Volume VIII., Elsevier, IFIP (1988) 189-204
-
(1988)
Protocol Specification, Testing and Verification
, vol.8
, pp. 189-204
-
-
Vissers, C.A.1
Scollo, G.2
Van Sinderen, M.3
-
14
-
-
0024664310
-
Decentralization of process nets with a centralized control
-
Back, R.J.R., Kurkio-Suonio, R.: Decentralization of process nets with a centralized control. Distributed Computing (1989) 73-87
-
(1989)
Distributed Computing
, pp. 73-87
-
-
Back, R.J.R.1
Kurkio-Suonio, R.2
-
15
-
-
0141797474
-
Framework and Tool Support for Formal Verification of High Speed Transfer Protocol Designs
-
Herrmann, P., Krumm, H., Drögehorn, O., Geisselhardt, W.: Framework and Tool Support for Formal Verification of High Speed Transfer Protocol Designs. Telecommunication Systems 20 (2002) 291-310
-
(2002)
Telecommunication Systems
, vol.20
, pp. 291-310
-
-
Herrmann, P.1
Krumm, H.2
Drögehorn, O.3
Geisselhardt, W.4
-
16
-
-
22044434009
-
Modular Specification and Verification of XTP
-
Herrmann, P., Krumm, H.: Modular Specification and Verification of XTP. Telecommunication Systems 9 (1998) 207-221
-
(1998)
Telecommunication Systems
, vol.9
, pp. 207-221
-
-
Herrmann, P.1
Krumm, H.2
-
19
-
-
84958759039
-
etc - A Tool Supporting the Construction of cTLA-Specifications
-
Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems. Number 1055 Springer-Verlag
-
Heyl, C., Mester, A., Krumm, H.: etc - A Tool Supporting the Construction of cTLA-Specifications. In Margaria, T., Steffen, B., eds.: Tools and Algorithms for the Construction and Analysis of Systems. Number 1055 in Lecture Notes in Computer Science, Springer-Verlag (1996) 407-411
-
(1996)
Lecture Notes in Computer Science
, pp. 407-411
-
-
Heyl, C.1
Mester, A.2
Krumm, H.3
-
20
-
-
33645268389
-
Constraint-Oriented Formal Modelling of OO-Systems
-
Helsinki, Kluwer Academic Publisher
-
Graw, G., Herrmann, P., Krumm, H.: Constraint-Oriented Formal Modelling of OO-Systems. In: Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems (DAIS 99), Helsinki, Kluwer Academic Publisher (1999) 345-358
-
(1999)
Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems (DAIS 99)
, pp. 345-358
-
-
Graw, G.1
Herrmann, P.2
Krumm, H.3
-
21
-
-
0002422823
-
A Role Based Access Control Model and Reference Implementation within a Corporate Intranet
-
Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information Systems Security 1 (1999) 34-64
-
(1999)
ACM Transactions on Information Systems Security
, vol.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
22
-
-
84884311106
-
Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
-
Osborn, S.L., Sandhu, R.S., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security 3 (2000) 85-106
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, pp. 85-106
-
-
Osborn, S.L.1
Sandhu, R.S.2
Munawer, Q.3
-
23
-
-
84957886335
-
Modeling the security of steganographic systems
-
Proceedings of the 2nd Workshop of Information Hiding. Portland, Springer-Verlag
-
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Proceedings of the 2nd Workshop of Information Hiding. LNCS 1525, Portland, Springer-Verlag (1998) 345-355
-
(1998)
LNCS
, vol.1525
, pp. 345-355
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
26
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
Oakland
-
Ferrari, E., Samarati, P., Bertino, E., Jajodia, S.: Providing flexibility in information flow control for object-oriented systems. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland (1997) 130-140
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
|