Sciweavers

276 search results - page 18 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
CODES
2005
IEEE
14 years 1 months ago
Microcoded coprocessor for embedded secure biometric authentication systems
We design and implement a cryptographic biometric authentication system using a microcoded architecture. The secure properties of the biometric matching process are obtained by me...
Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhe...
SEE
1989
Springer
13 years 11 months ago
Tool Integration in Software Engineering Environments
This article presents doctoral research on tool integration within software engineering environments. Tool integration concerns the techniques used to form coalitions of tools tha...
Anthony I. Wasserman
DAC
2008
ACM
13 years 9 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
WICSA
2008
13 years 9 months ago
Extraction of Component-Based Architecture from Object-Oriented Systems
Software architecture modeling and representation became a main phase of the development process of complex systems. In fact, software architecture representation provides many ad...
Sylvain Chardigny, Abdelhak Seriai, Mourad Oussala...
ACSAC
2009
IEEE
14 years 2 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson