Sciweavers

2429 search results - page 109 / 486
» Using Aspects to Design a Secure System
Sort
View
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
14 years 2 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn
VIZSEC
2004
Springer
14 years 2 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
AOSD
2007
ACM
14 years 1 months ago
ATOLL: aspect-oriented toll system
Product line development places emphasis on quality attributes like understandability, maintainability, reusability and variability. Better modularization techniques like ...
Luis Daniel Benavides Navarro, Christa Schwanninge...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 25 days ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
IFIP
1992
Springer
14 years 1 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg