Sciweavers

8503 search results - page 177 / 1701
» Secure Software Architectures
Sort
View
CCS
2001
ACM
14 years 2 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
ACSAC
2010
IEEE
13 years 8 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
CIS
2006
Springer
14 years 1 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
ISSE
2006
13 years 10 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
ICSE
1998
IEEE-ACM
14 years 2 months ago
Architecture-Based Runtime Software Evolution
Continuous availability is a critical requirement for an important class of software systems. For these systems, runtime system evolution can mitigate the costs and risks associat...
Peyman Oreizy, Nenad Medvidovic, Richard N. Taylor