Sciweavers

1177 search results - page 134 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ISSS
2002
IEEE
138views Hardware» more  ISSS 2002»
14 years 1 months ago
An Object-Oriented Design Process for System-on-Chip Using UML
The object-oriented design process has been a hot topic in software development since it will improve product quality and productivity significantly, which is also a major issue i...
Tsuneo Nakata, Akio Matsuda, Minoru Shoji, Shinya ...
DAC
2007
ACM
14 years 10 months ago
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that...
G. Edward Suh, Srinivas Devadas
ASPLOS
2008
ACM
13 years 11 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
ER
2004
Springer
169views Database» more  ER 2004»
14 years 2 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
ICSE
2007
IEEE-ACM
14 years 9 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova