Sciweavers

2056 search results - page 293 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
MODELS
2007
Springer
14 years 3 months ago
11th International Workshop on Aspect-Oriented Modeling
This report summarizes the results and discussions from the 11th Workshop on Aspect-Oriented Modeling (AOM). The workshop was held in conjunction with the International Conference ...
Jörg Kienzle, Jeff Gray, Dominik Stein, Walte...
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 9 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
STORAGESS
2005
ACM
14 years 2 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
OOPSLA
2009
Springer
14 years 3 months ago
TROPIC: a framework for model transformations on petri nets in color
Model transformation languages, the cornerstone of Modelngineering, often lack mechanisms for abstraction, reuse and debugging. We propose a model transformation k providing diffe...
Manuel Wimmer, Gerti Kappel, Johannes Schönb&...
EUROSYS
2010
ACM
14 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry