Sciweavers

4330 search results - page 47 / 866
» Analyzing security architectures
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
ACSAC
2000
IEEE
13 years 12 months ago
Security Architecture for Federated Cooperative Information Systems
The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
Pierre Bieber, D. Raujol, Pierre Siron
HPCA
2011
IEEE
12 years 11 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
IEEEARES
2006
IEEE
14 years 1 months ago
Towards a Security Architecture for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security i...
Klaus Plößl, Thomas Nowey, Christian Ml...
CAP
2010
13 years 2 months ago
Parallel arithmetic encryption for high-bandwidth communications on multicore/GPGPU platforms
In this work we study the feasibility of high-bandwidth, secure communications on generic machines equipped with the latest CPUs and General-Purpose Graphical Processing Units (GP...
Ludovic Jacquin, Vincent Roca, Jean-Louis Roch, Mo...