Sciweavers

739 search results - page 42 / 148
» A security framework for the analysis and design of software...
Sort
View
RE
2005
Springer
14 years 2 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 9 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
ICSE
2003
IEEE-ACM
14 years 9 months ago
Quantifying the Value of Architecture Design Decisions: Lessons from the Field
This paper outlines experiences with using economic criteria to make architecture design decisions. It briefly describes the CBAM (Cost Benefit Analysis Method) framework applied ...
Mike Moore, Rick Kazman, Mark Klein, Jai Asundi
ISARCS
2010
141views Hardware» more  ISARCS 2010»
14 years 29 days ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
OOPSLA
2005
Springer
14 years 2 months ago
DOSC: dispersed operating system computing
Over the past decade the sheer size and complexity of traditional operating systems have prompted a wave of new approaches to help alleviate the services provided by these operati...
Ramesh K. Karne, Karthick V. Jaganathan, Nelson Ro...