Sciweavers

1177 search results - page 81 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
TRUST
2010
Springer
14 years 1 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
EXTREME
2003
ACM
14 years 2 months ago
Can Topic Maps describe context for enterprise-wide applications?
Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information th...
Duane Degler, Lisa Battle
JSS
2010
215views more  JSS 2010»
13 years 7 months ago
Analyzing architectural styles
The backbone of many software architectures and component integration frameworks is an architectural style that provides a domain-specific design vocabulary and a set of constrai...
Jung Soo Kim, David Garlan
CODES
2008
IEEE
14 years 3 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano
TIFS
2008
142views more  TIFS 2008»
13 years 8 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...