Language-based security

Results: 118



#Item
11Computer access control / Identity management / Federated identity / Cloud infrastructure / Provisioning / Single sign-on / Cloud computing / Security Assertion Markup Language / Customer relationship management / Identity management system / SAML-based products and services

MARKET UPDATE Identity & Access Management Services Introduction Champion

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2013-06-28 13:07:23
12Engineering / Computing / Technology / Computer systems / Systems engineering / Cyber-physical system / Systems Modeling Language / Internet of things / Object Process Methodology / Computer security / Model-based testing / Systems design

Software and System Engineering for Cyber-Physical Systems: technical challenges and collaboration opportunities 26 January 2016 – IRIT Toulouse http://www.cpse-labs.eu/news_item6.php Workshop goals

Add to Reading List

Source URL: www.erts2016.org

Language: English - Date: 2016-01-07 12:52:40
13

Opportunities for Language Based Information Flow Security in Sensor Networks Victor Shnayder Harvard University

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2010-08-19 02:00:16
    14Web services / Computing / World Wide Web / Web of Things / Service-oriented architecture / Devices Profile for Web Services / Internet of things / Web Services Description Language / WS-Security based products and services / Project Metro

    In Search of an Internet of Things Service Architecture: REST or WS-*? A Developers’ Perspective Dominique Guinard, Iulia Ion, and Simon Mayer Institute for Pervasive Computing, ETH Zurich, Switzerland, dguinard|iulia.

    Add to Reading List

    Source URL: www.vs.inf.ethz.ch

    Language: English
    15Web services / Identity management / Computer access control / Web Services Description Language / Security Assertion Markup Language / SOAP / WS-Security / WS-Addressing / SAML 1.1 / SAML-based products and services / GSOAP

    SERVICE and API EMULATION CloudPort is an easy-to-configure, comprehensive service emulation product for mimicking service APIs as a virtual endpoint or ESB broker that can be communicated Easy to Deploy

    Add to Reading List

    Source URL: www.crosschecknet.com

    Language: English - Date: 2012-10-09 22:39:20
    16Hacking / Cloud standards / Computer access control / Computer network security / Web development / JavaScript / HTTP cookie / Password manager / Cross-site request forgery / Cross-site scripting / Browser security / OAuth

    Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

    Add to Reading List

    Source URL: www.defensivejs.com

    Language: English - Date: 2013-08-15 09:17:30
    17Theoretical computer science / Logic in computer science / Formal methods / Mathematical logic / KeY / Formal verification / Dynamic logic / Automated theorem proving / Logic / Language-based security

    A Theorem Proving Approach to Secure Information Flow in Concurrent Programs (Extended Abstract) Daniel Bruns, Karlsruhe Institute of Technology We present an approach to formally prove secure information flow in multi-t

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2015-07-09 06:40:16
    18Cryptography / Computer security / Language-based security / KeY / Ciphertext indistinguishability / Universal composability

    A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

    Add to Reading List

    Source URL: grsrd.uni.lu

    Language: English - Date: 2013-04-09 08:10:38
    19Linguistics / Language / Writing / Korean language / Password / Hangul

    Poster: Korean Vowel Based Passwords Ji-Hyeon Yoon Hae Young Lee Department of Information Security

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:24
    20Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

    Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

    Add to Reading List

    Source URL: swerl.tudelft.nl

    Language: English - Date: 2008-04-25 16:21:05
    UPDATE