Sciweavers

193 search results - page 14 / 39
» Maintaining Software with a Security Perspective
Sort
View
ICSE
1994
IEEE-ACM
13 years 12 months ago
SAAM: A Method for Analyzing the Properties of Software Architectures
While software architecture has become an increasingly important research topic in recent years, insufficient attention has been paid to methods for evaluation of these architectu...
Rick Kazman, Leonard J. Bass, Mike Webb, Gregory D...
DSN
2002
IEEE
14 years 23 days ago
On the Placement of Software Mechanisms for Detection of Data Errors
An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between ...
Martin Hiller, Arshad Jhumka, Neeraj Suri
LATINCRYPT
2010
13 years 6 months ago
A Lattice-Based Threshold Ring Signature Scheme
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar’s code-based solution to use the short integer solution (SIS) problem as securi...
Pierre-Louis Cayrel, Richard Lindner, Markus R&uum...
COMPSAC
2006
IEEE
13 years 11 months ago
A Service-Oriented Design Framework for Secure Network Applications
Abstract---Service Oriented Architecture (SOA) is an architectural style to reuse and integrate existing systems for designing new applications. Each application is designed in an ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
TRUST
2010
Springer
14 years 26 days ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...