Sciweavers

2178 search results - page 36 / 436
» Toward Systemically Secure IT Architectures
Sort
View
DISCEX
2003
IEEE
14 years 1 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
IEEEARES
2009
IEEE
14 years 2 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
REFSQ
2010
Springer
13 years 9 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...
WS
2003
ACM
14 years 29 days ago
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and i...
Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S...
EUROSYS
2010
ACM
14 years 24 days ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer