Sciweavers

8503 search results - page 74 / 1701
» Secure Software Architectures
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Experience with Software Watermarking
Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di M...
ASPLOS
2006
ACM
14 years 2 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
RE
2004
Springer
14 years 2 months ago
Quantifying Non-Functional Requirements: A Process Oriented Approach
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
Raquel L. Hill, Jun Wang, Klara Nahrstedt
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 9 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
EUROPKI
2007
Springer
14 years 3 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier