Sciweavers

427 search results - page 36 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
TOOLS
1999
IEEE
14 years 1 months ago
Automatic Detection of Design Problems in Object-Oriented Reengineering
The evolution of software systems over many years often leads to unnecessarily complex and in exible designs which in turn lead to a huge amount of e ort for enhancements and main...
Oliver Ciupke
TII
2011
206views Education» more  TII 2011»
13 years 3 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
VIZSEC
2005
Springer
14 years 2 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
ESCIENCE
2006
IEEE
14 years 2 months ago
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH
Grid systems have a reputation for being difficult to build and use. We describe how the ease of use of the Styx Grid Services (SGS) software can be combined with the security and...
J. D. Blower, K. Haines
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
14 years 2 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...