Sciweavers

2337 search results - page 69 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
13 years 12 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
EUROSYS
2008
ACM
14 years 4 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
ENGL
2006
87views more  ENGL 2006»
13 years 7 months ago
Multiagent Web based Decision Support Systems for Global Enterprises: An Architectural Blueprint
Financial institutions are striving to maximize benefits from the emerging digital economy. However, the decision to take such an investment option is contingent upon the "pr...
Tagelsir Mohamed Gasmelseid
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 19 hour ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández