Sciweavers

2178 search results - page 177 / 436
» Toward Systemically Secure IT Architectures
Sort
View
SACMAT
2006
ACM
14 years 3 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
ERSA
2009
109views Hardware» more  ERSA 2009»
13 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
ICTCS
2005
Springer
14 years 3 months ago
A Typed Assembly Language for Non-interference
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture, stating that confidential information is not disclosed in public output. The c...
Ricardo Medel, Adriana B. Compagnoni, Eduardo Bone...
SASO
2008
IEEE
14 years 4 months ago
A Middleware Architecture for Human-Centred Pervasive Adaptive Applications
As software is more and more interweaving with our everyday life, designing software in a way that it reflects and respects the user and her emotional physical conditions, cogniti...
Andreas Schroeder, Marjolein van der Zwaag, Moritz...
DEBU
2006
166views more  DEBU 2006»
13 years 9 months ago
Oracle's Self-Tuning Architecture and Solutions
Performance tuning in modern database systems requires a lot of expertise, is very time consuming and often misdirected. Tuning attempts often lack a methodology that has a holist...
Benoît Dageville, Karl Dias