Sciweavers

2056 search results - page 64 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
ICSE
2003
IEEE-ACM
14 years 9 months ago
A Component Architecture for an Extensible, Highly Integrated Context-Aware Computing Infrastructure
Ubiquitous context-aware computing systems present several challenges in their construction. Principal among them is the tradeoff between easily providing new contextaware service...
William G. Griswold, Robert T. Boyer, Steven W. Br...
OOPSLA
2005
Springer
14 years 3 months ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch
KBSE
2005
IEEE
14 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
EUROMICRO
2004
IEEE
14 years 1 months ago
Investigations in Applying Metrics to Multi-View Architecture Models
The goal of our research is to develop industry-proof software architecture and design metrics. We identify a number of problems that arise in computing software architecture and ...
Johan Muskens, Michel R. V. Chaudron, Christian La...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 3 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...