Sciweavers

8503 search results - page 95 / 1701
» Secure Software Architectures
Sort
View
CCS
2008
ACM
13 years 11 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ICDCS
2008
IEEE
14 years 3 months ago
PAS: A Wireless-Enabled, Cell-Phone-Incorporated Personal Assistant System for Independent and Assisted Living
Advances in networking, sensors, medical devices and smart phones have made it feasible to monitor and provide medical and other assistance to people either in their homes or outs...
Zheng Zeng, S. Yu, Wook Shin, Jennifer C. Hou
ICSE
1999
IEEE-ACM
14 years 1 months ago
Haemo Dialysis Software Architecture Design Experiences
In this paper we present the experiences and architecture from a research project conducted in cooperation with two industry partners. The goal of the project was to reengineer an...
PerOlof Bengtsson, Jan Bosch
CCS
2001
ACM
14 years 1 months ago
Discouraging Software Piracy Using Software Aging
Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We defin...
Markus Jakobsson, Michael K. Reiter