Sciweavers

341 search results - page 47 / 69
» A Security Engineering Process based on Patterns
Sort
View
126
Voted
WOSP
2004
ACM
15 years 7 months ago
Experimenting different software architectures performance techniques: a case study
In this paper we describe our experience in performance analysis of the software architecture of the NICE case study which is responsible for providing several secure communicatio...
Simonetta Balsamo, Moreno Marzolla, Antinisca Di M...
DEBU
2006
112views more  DEBU 2006»
15 years 2 months ago
Web Information Extraction and User Modeling: Towards Closing the Gap
Web search engines have become the primary method of accessing information on the web. Billions of queries are submitted to major web search engines, reflecting a wide range of in...
Eugene Agichtein
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 6 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
IPPS
2007
IEEE
15 years 8 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
TOOLS
1999
IEEE
15 years 6 months ago
A "Framework" for Object Oriented Frameworks Design
Object-oriented frameworks are an established tool for domain-specific reuse. Many framework design patterns and development processes have been documented, typically reverse engin...
David Parsons, Awais Rashid, Andreas Speck, Alexan...