Sciweavers

2429 search results - page 152 / 486
» Using Aspects to Design a Secure System
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 2 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
ACSAC
2003
IEEE
14 years 2 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 3 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
DALT
2009
Springer
14 years 19 days ago
Ontology and Time Evolution of Obligations and Prohibitions Using Semantic Web Technology
The specification and monitoring of conditional obligations and prohibitions with starting points and deadlines is a crucial aspect in the design of open interaction systems. In th...
Nicoletta Fornara, Marco Colombetti
ICECCS
2005
IEEE
91views Hardware» more  ICECCS 2005»
14 years 2 months ago
Extending SOFL Features for AOP Modeling
SOFL is a formal language and method for software system analysis, specification and design and it fully supports structured techniques and object-oriented techniques. AOP (Aspect...
Yao Shen, Haopeng Chen