Sciweavers

191 search results - page 7 / 39
» Building Intrusion-Tolerant Secure Software
Sort
View
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
SIGUCCS
2003
ACM
14 years 1 months ago
Liberating lab computing: building a stable yet flexible computing environment for students and faculty
Indiana State University has found a way in its 25+ computing facilities to combine the need for a central stable lab image and small support staff with the academic needs of flex...
Kenneth Janz, Pei-Yi Hu
GLOBECOM
2008
IEEE
14 years 2 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair
AGENTS
2000
Springer
14 years 8 days ago
Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents
In this paper we develop a notion of “objective trust” for Software Agents, that is trust of, or between, Agents based on actual experiences between those Agents. Experiential ...
Mark Witkowski, Alexander Artikis, Jeremy Pitt
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine