Sciweavers

113 search results - page 6 / 23
» Computing the Leakage of Information-Hiding Systems
Sort
View
SERP
2004
14 years 7 days ago
Keeping Secrets within a Family: Rediscovering Parnas
David Parnas wrote several papers in the 1970's and 1980's that are now considered classics. The concepts he advocated such as information hiding and bstract interfaces ...
H. Conrad Cunningham, Cuihua Zhang, Yi Liu
ECOOPW
1999
Springer
14 years 3 months ago
The GOODLY Design Language for MOOD2 Metrics Collection
The GOODLY language can be used to specify the design of systems built according to the Object Oriented paradigm. It was conceived with the main purpose of facilitating the extrac...
Fernando Brito e Abreu, Luis Ochoa, Miguel Goul&at...
IFIPTCS
2010
13 years 8 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
ICASSP
2011
IEEE
13 years 2 months ago
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
A rechargeable battery may be used to partially protect the privacy of information contained in a household’s electrical load profile. We represent the system as a finite stat...
David P. Varodayan, Ashish Khisti
EUC
2006
Springer
14 years 2 months ago
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB
- Modern portable or embedded systems support more and more complex applications. These applications make embedded devices require not only low powerconsumption, but also high comp...
Wann-Yun Shieh, Hsin-Dar Chen