Sciweavers

2257 search results - page 233 / 452
» Secure program partitioning
Sort
View
SIGSOFT
2010
ACM
13 years 8 months ago
Software engineering issues for mobile application development
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...
Anthony I. Wasserman
CCS
2009
ACM
14 years 5 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
CCS
2007
ACM
14 years 4 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CCS
2011
ACM
12 years 10 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
IJHPCA
2007
114views more  IJHPCA 2007»
13 years 10 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima