Now showing items 1-10 of 28
Message from the NCIW Program Co-chairs
It is our pleasure to welcome you to COMPSAC 2017 Symposium on Networks, Communications, Internet & Web Technologies (NCIW). Our Symposium provides a forum to share latest innovations on all types of networks with their ...
Firewall configuration management using XACML policies
A collection of slides from the author's conference presentation is given.
End-to-end security implementation for mobile devices using TLS protocol
End-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is ...
Location aware self-adapting firewall policies
(World Scientific and Engineering Academy and Society, 2008-06)
Private access to corporate servers from Internet can be achieved using various security mechanisms. This article presents a network access control mechanism that employs a policy management architecture empowered with ...
The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing
Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of ...
Input contract testing of graphical user interfaces
(World Scientific Publishing, 2016-03)
User inputs are critical for the security, safety, and reliability of software systems. This paper proposes a new concept called user input contracts, which is an integral part of a design-by-contract supplemented development ...
Transforming VHDL to timed automata
This report presents the transformation of behavioral VHDL programs to Timed Automata.
Automation architecture for Bayesian Network based test case prioritization and execution
An automation architecture for Bayesian Network based test case prioritization is designed for software written in Java programming language following the approach proposed by Mirarab and Tahvildari . The architecture ...
Feedback control based test case instantiation for firewall testing
A firewall's proper functioning is critical to the network it protects. Thus, a firewall should be tested with respect to its intended security policy. We propose a feedback control based approach for test case generation ...
COMPSAC 2016 Symposium on Technologies and Applications of the Internet (TAIN): Message from the Program Co-chairs
It is our pleasure to welcome you to COMPSAC 2016 Symposium on Technologies and Applications of the Internet (TAIN). Our Symposium provides a forum to share latest innovations on Internet technologies and applications, ...