Sciweavers

8503 search results - page 114 / 1701
» Secure Software Architectures
Sort
View
ICSE
2003
IEEE-ACM
14 years 9 months ago
Patterns Approach to Building Software Systems
This position paper suggests an approach for building software systems using patterns, right from business architecture to software architecture. Further, the approach incorporate...
Satish Chandra, Satyendra Bhattaram
EUROCRYPT
1999
Springer
14 years 1 months ago
Software Performance of Universal Hash Functions
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
Wim Nevelsteen, Bart Preneel
ICSE
2000
IEEE-ACM
14 years 16 days ago
E-Slate: a software architectural style for end-user programming
This paper describes E-Slate (http://E-Slate.cti.gr), an exploratory learning environment that builds on a componentbased approach, to enable end-users to create educational softw...
George Birbilis, Manolis Koutlis, Kriton Kyrimis, ...
DSN
2009
IEEE
14 years 3 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis
CCGRID
2002
IEEE
14 years 1 months ago
Symphony - A Java-Based Composition and Manipulation Framework for Computational Grids
We introduce the Symphony framework, a software ion layer that can sit on top of grid systems. Symphony provides a unified API for grid application developers and offers a graphic...
Markus Lorch, Dennis G. Kafura