Sciweavers

933 search results - page 169 / 187
» Secure Software Architectures Design by Aspect Orientation
Sort
View
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 10 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
CACM
2005
126views more  CACM 2005»
13 years 7 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
MODELS
2007
Springer
14 years 1 months ago
UML2Alloy: A Challenging Model Transformation
Abstract. Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 3 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
AOSE
2005
Springer
14 years 1 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh