Sciweavers

33 search results - page 1 / 7
» Protection Reconfiguration for Reusable Software
Sort
View
CSMR
1998
IEEE
14 years 7 days ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
ICSR
2004
Springer
14 years 1 months ago
A Metamodel-Based Approach for the Dynamic Reconfiguration of Component-Based Software
Non-stop and highly available applications need to be dynamically adapted to new conditions in their execution environment, to new user requirements or to some situations usually u...
Abdelmadjid Ketfi, Noureddine Belkhatir
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
13 years 11 months ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
TROB
2002
169views more  TROB 2002»
13 years 7 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin
ICDCS
1996
IEEE
14 years 3 days ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...