Sciweavers

276 search results - page 7 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
WCRE
2007
IEEE
14 years 1 months ago
Dynamic Analysis Techniques for the Reconstruction of Architectural Views
Gaining an understanding of software systems is an important discipline in many software engineering contexts. It is essential that software engineers are assisted as much as poss...
Bas Cornelissen
RE
2001
Springer
13 years 11 months ago
Reconciling Software Requirements and Architectures: The CBSP Approach
Little guidance and few methods are available to refine a set of software requirements into an architecture satisfying those requirements. Part of the challenge stems from the fac...
Paul Grünbacher, Alexander Egyed, Nenad Medvi...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 1 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
MIDDLEWARE
2004
Springer
14 years 21 days ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
OMER
2001
13 years 8 months ago
Model-Based Design of ECU Software - A Component Based Approach
: This paper shows how architecture description languages can be tailored to the design of embedded automotive control software. Furthermore, graphical modeling means are put in an...
Ulrich Freund, Alexander Burst