Sciweavers

739 search results - page 69 / 148
» A security framework for the analysis and design of software...
Sort
View
BCS
2008
13 years 10 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ISSA
2008
13 years 10 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
CLA
2006
13 years 10 months ago
Using FCA to Suggest Refactorings to Correct Design Defects
Abstract. Design defects are poor design choices resulting in a hard-tomaintain software, hence their detection and correction are key steps of a disciplined software process aimed...
Naouel Moha, Jihene Rezgui, Yann-Gaël Gu&eacu...
JSW
2006
89views more  JSW 2006»
13 years 8 months ago
Towards a Mathematical Foundation for Service-Oriented Applications Design
Abstract-- Leveraging service oriented programming paradigm would significantly affect the way people build software systems. However, to achieve this goal a solid software design ...
Aliaksei Yanchuk, Alexander Ivanyukovich, Maurizio...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 10 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff