Sciweavers

2236 search results - page 82 / 448
» Secure Software Design in Practice
Sort
View
84
Voted
ICSE
2003
IEEE-ACM
16 years 2 months ago
Architecture, Design, Implementation
The terms architecture, design, and implementation are typically used informally in partitioning software specificato three coarse strata of abstraction. Yet these strata are not ...
Amnon H. Eden, Rick Kazman
117
Voted
ISI
2005
Springer
15 years 8 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
CONEXT
2008
ACM
15 years 4 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
CCS
2008
ACM
15 years 4 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
100
Voted
COMPSAC
2006
IEEE
15 years 8 months ago
Design Structural Stability Metrics and Post-Release Defect Density: An Empirical Study
This paper empirically explores the correlations between a suite of structural stability metrics for object-oriented designs and post-release defect density. The investigated stab...
Mahmoud O. Elish, David C. Rine