Sciweavers

269 search results - page 33 / 54
» Comparison of Scenario-Based Software Architecture Evaluatio...
Sort
View
CCS
2004
ACM
14 years 2 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
COMSWARE
2006
IEEE
14 years 2 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
ACSAC
2006
IEEE
14 years 2 months ago
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
Address space randomization is an emerging and promising method for stopping a broad range of memory corruption attacks. By randomly shifting critical memory regions at process in...
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, ...
ACSAC
2003
IEEE
14 years 13 days ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
ASWEC
2009
IEEE
14 years 3 months ago
Change Propagation Analysis Using Domain Information
We propose a novel methodology for analysing change propagation in software using the domain-level behavioural model of a system. We hypothesize that change propagation analysis i...
Amir Aryani, Ian D. Peake, Margaret Hamilton, Hein...