Sciweavers

8623 search results - page 185 / 1725
» Software engineering for secure systems
Sort
View
ICSE
2009
IEEE-ACM
14 years 10 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
LCTRTS
2004
Springer
14 years 3 months ago
Speculative software management of datapath-width for energy optimization
Gilles Pokam, Olivier Rochecouste, André Se...
COMPSAC
2009
IEEE
14 years 4 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulï¬...
Rafael Accorsi
COMPSAC
2006
IEEE
14 years 1 months ago
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks
This paper proposes an improved free-roaming mobile agent security protocol. The scheme uses "one hop backwards and two hops forwards" chain relation as the protocol cor...
Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Lu...
DAGSTUHL
2009
13 years 10 months ago
Engineering Self-Adaptive Systems through Feedback Loops
To deal with the increasing complexity of software systems and uncertainty of their environments, software engineers have turned to self-adaptivity. Self-adaptive systems are capab...
Yuriy Brun, Giovanna Di Marzo Serugendo, Cristina ...