Sciweavers

1938 search results - page 231 / 388
» Dependable Software
Sort
View
SAC
2009
ACM
14 years 4 months ago
A systematic method for generating quality requirements spectrum
Spectrum analysis for quality requirements is useful for measuring and tracking them, but current spectrum analysis largely depends on expertise of each analyst. Therefore, it tak...
Shunichi Suzuki, Akira Osada, Tomonori Sato, Haruh...
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
14 years 3 months ago
SecBus: Operating System controlled hierarchical page-based memory bus protection
—This paper presents a new two-levels page-based memory bus protection scheme. A trusted Operating System drives a hardware cryptographic unit and manages security contexts for e...
Lifeng Su, Stephan Courcambeck, Pierre Guillemin, ...
ISW
2009
Springer
14 years 3 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...
DATE
2008
IEEE
167views Hardware» more  DATE 2008»
14 years 3 months ago
Accuracy-Adaptive Simulation of Transaction Level Models
Simulation of transaction level models (TLMs) is an established embedded systems design technique. Its use cases include virtual prototyping for early software development, platfo...
Martin Radetzki, Rauf Salimi Khaligh
ACSAC
2007
IEEE
14 years 3 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo