Sciweavers

1177 search results - page 24 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
SAC
2008
ACM
13 years 8 months ago
Autonomic management policy specification in Tune
Distributedsoftwareenvironmentsareincreasinglycomplex anddiculttomanage,astheyintegratevariouslegacysoftware with specic management interfaces. Moreover, the factthatmanagementtas...
Laurent Broto, Daniel Hagimont, Patricia Stolf, No...
ISARCS
2010
141views Hardware» more  ISARCS 2010»
14 years 19 days ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
CCS
2008
ACM
13 years 10 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
COBUILD
1998
Springer
14 years 26 days ago
Roomware for Cooperative Buildings: Integrated Design of Architectural Spaces and Information Spaces
In this paper, we introduce the concepts of "cooperative buildings" and "roomware" and place them in the context of the integrated design of real, physical, res...
Norbert A. Streitz, Jörg Geißler, Torst...