Sciweavers

1177 search results - page 76 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
WICSA
2007
13 years 10 months ago
Architecture Assessment Model for System Evolution
1 Even though there has been some research on system evolution, there is no well defined vocabulary to indicate deviation of a system from desired goals. Further, there are no obje...
Sutirtha Bhattacharya, Dewayne E. Perry
AIS
2004
Springer
14 years 2 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
14 years 2 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
CODES
2006
IEEE
13 years 10 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ICSE
2003
IEEE-ACM
14 years 2 months ago
Reliability Support for the Model Driven Architecture
Reliability is an important concern for software dependability. Quantifying dependability in terms of reliability can be carried out by measuring the continuous delivery of a corr...
Genaína Nunes Rodrigues, Graham Roberts, Wo...