Sciweavers

2178 search results - page 54 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CSMR
2008
IEEE
14 years 3 months ago
Towards Recovering Architectural Concepts Using Latent Semantic Indexing
Software engineers think about an existing software system in terms of high-level models. The high-level models are translated to source code and the concepts represented in these...
Pieter van der Spek, Steven Klusener, Piërre ...
QOSA
2009
Springer
14 years 3 months ago
Toward a Catalogue of Architectural Bad Smells
Abstract. An architectural bad smell is a commonly (although not always intentionally) used set of architectural design decisions that negatively impacts system lifecycle propertie...
Joshua Garcia, Daniel Popescu, George Edwards, Nen...
EEE
2005
IEEE
14 years 2 months ago
Service Composition in a Secure Agent-Based Architecture
We describe an agent-based situation-aware survivable architecture for the discovery and composition of web services. Our architecture provides for proofs that guaranteethe consis...
Ramesh Bharadwaj, Supratik Mukhopadhyay, Nilay Pad...
CCS
2007
ACM
14 years 3 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
TRUST
2010
Springer
13 years 7 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte