Sciweavers

8503 search results - page 31 / 1701
» Secure Software Architectures
Sort
View
ICICS
1997
Springer
14 years 27 days ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
CODES
2005
IEEE
14 years 2 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
AISADM
2005
Springer
14 years 2 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
ACSAC
2006
IEEE
14 years 2 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee
WICSA
2007
13 years 10 months ago
Assessing a Multi-Site Development Organization for Architectural Compliance
Multi-site development organizations require coordination and communication efforts between different sites to ensure successful distributed development. These efforts need to be ...
Viktor Clerc, Patricia Lago, Hans van Vliet