Sciweavers

191 search results - page 25 / 39
» Building Intrusion-Tolerant Secure Software
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Applying a Tradeoff Model (TOM) to TACT
In a software system, it is inevitable that components will occasionally fail to produce acceptable results and become unavailable to serve its clients. Replication is the techniq...
Raihan Al-Ekram, Richard C. Holt, Chris Hobbs
SIGSOFT
2000
ACM
14 years 9 days ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia
KBSE
2008
IEEE
14 years 2 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
OOPSLA
2007
Springer
14 years 2 months ago
From developer's head to developer tests: characterization, theories, and preventing one more bug
Unit testing frameworks like JUnit are a popular and effective way to prevent developer bugs. We are investigating two ways of building on these frameworks to prevent more bugs wi...
David Saff