Sciweavers

2429 search results - page 113 / 486
» Using Aspects to Design a Secure System
Sort
View
ECOOPW
1998
Springer
14 years 1 months ago
Program Restructuring to Introduce Design Patterns
In restructuring legacy code it may be useful to introduce a design pattern in order to add clarity to the system and thus facilitate further program evolution. We show that aspec...
Mel Ó Cinnéide, Paddy Nixon
IFIP
2007
Springer
14 years 3 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
ECIS
2000
13 years 10 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
FMCAD
2000
Springer
14 years 22 days ago
Visualizing System Factorizations with Behavior Tables
Abstract. Behavior tables are a design formalization intended to support interactive design derivation for hardware and embedded systems. It is a reformulation of the DDD transform...
Alex Tsow, Steven D. Johnson
ESORICS
1994
Springer
14 years 1 months ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson