Sciweavers

2056 search results - page 77 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
WICSA
2004
13 years 11 months ago
Software Architecture for Large-Scale, Distributed, Data-Intensive Systems
The sheer amount of data produced by modern science research has created a need for the construction and understanding of "data-intensive systems", largescale, distribut...
Chris Mattmann, Daniel J. Crichton, J. Steven Hugh...
DAC
2012
ACM
12 years 2 days ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar
ESSOS
2011
Springer
13 years 1 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
WCET
2010
13 years 7 months ago
WCET Analysis of a Parallel 3D Multigrid Solver Executed on the MERASA Multi-Core
To meet performance requirements as well as constraints on cost and power consumption, future embedded systems will be designed with multi-core processors. However, the question o...
Christine Rochange, Armelle Bonenfant, Pascal Sain...