Sciweavers

427 search results - page 40 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
GROUP
2007
ACM
14 years 19 days ago
The story of a working workflow management system
This work presents experiences with the adopting of a workflow management system in a large financial institution. We describe the gradual evolution of a traditional work process,...
Steen Brahe, Kjeld Schmidt
ECBS
2007
IEEE
144views Hardware» more  ECBS 2007»
14 years 3 months ago
DP-Miner: Design Pattern Discovery Using Matrix
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is general...
Jing Dong, Dushyant S. Lad, Yajing Zhao
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 11 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
12 years 8 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
PET
2004
Springer
14 years 2 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...