Sciweavers

2281 search results - page 15 / 457
» Security Patterns and Secure Systems Design
Sort
View
IRI
2006
IEEE
14 years 2 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
DAC
2004
ACM
14 years 9 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
ACSAC
2000
IEEE
14 years 1 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
OOPSLA
2010
Springer
13 years 7 months ago
Concurrency by modularity: design patterns, a case in point
General purpose object-oriented programs typically aren’t embarrassingly parallel. For these applications, finding enough concurrency remains a challenge in program design. To ...
Hridesh Rajan, Steven M. Kautz, Wayne Rowcliffe
CSCW
2012
ACM
12 years 4 months ago
Community-based web security: complementary roles of the serious and casual contributors
Does crowdsourcing work for web security? While the herculean task of evaluating hundreds of millions of websites can certainly benefit from the wisdom of crowds, skeptics questi...
Pern Hui Chia, John Chuang