Sciweavers

1177 search results - page 92 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
ECSA
2010
Springer
13 years 7 months ago
Mining Relationships between the Participants of Architectural Patterns
Abstract Architectural patterns are often combined with other, relevant architectural patterns during software architecture design. However, combining patterns effectively remains ...
Ahmad Waqas Kamal, Paris Avgeriou
JCS
2002
115views more  JCS 2002»
13 years 8 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
CASES
2001
ACM
14 years 14 days ago
Patchable instruction ROM architecture
Increased systems level integration has meant the movement of many traditionally off chip components onto a single chip including a processor, instruction storage, data path, and ...
Timothy Sherwood, Brad Calder
CODES
2007
IEEE
14 years 3 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont