Sciweavers

299 search results - page 39 / 60
» Optimizing a policy authoring framework for security and pri...
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
A Framework for Proactive Fault Tolerance
Fault tolerance is a major concern to guarantee availability of critical services as well as application execution. Traditional approaches for fault tolerance include checkpoint/r...
Geoffroy Vallée, Kulathep Charoenpornwattan...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
CCS
2004
ACM
14 years 28 days ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
SEKE
2007
Springer
14 years 1 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 1 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...