Sciweavers

247 search results - page 11 / 50
» Information hiding for trusted system design
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
SISW
2005
IEEE
14 years 1 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman
WETICE
2005
IEEE
14 years 1 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
EUROPKI
2009
Springer
13 years 5 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
METRICS
1996
IEEE
13 years 11 months ago
Evaluating the Impact of Object-Oriented Design on Software Quality
This paper describes the results of a study where the impact of Object-Oriented design on software quality characteristics is experimentally evaluated. A suite of metrics for OO d...
Fernando Brito e Abreu, Walcélio L. Melo