Sciweavers

8623 search results - page 119 / 1725
» Software engineering for secure systems
Sort
View
LCTRTS
2009
Springer
14 years 4 months ago
Tracing interrupts in embedded software
Giovani Gracioli, Sebastian Fischmeister
COMPSAC
2000
IEEE
14 years 1 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
EUROSYS
2009
ACM
14 years 6 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
ICSE
2009
IEEE-ACM
14 years 4 months ago
Semantics-based code search
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user’s specifications. The key words here are spec...
Steven P. Reiss
ICSE
2007
IEEE-ACM
14 years 3 months ago
Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs
This paper outlines our experiences with making architectural tradeoffs between performance, availability, security, and usability, in light of stringent cost and time-to-market c...
T. C. Nicholas Graham, Rick Kazman, Chris Walmsley