Sciweavers

2429 search results - page 162 / 486
» Using Aspects to Design a Secure System
Sort
View
APSCC
2008
IEEE
13 years 11 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
CCS
2008
ACM
13 years 11 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
ICSM
2005
IEEE
14 years 2 months ago
Measurement and Quality in Object-Oriented Design
In order to support the maintenance of object-oriented software systems, the quality of their design must be evaluated using adequate quantification means. In spite of the curren...
Radu Marinescu
ACMDIS
2006
ACM
14 years 3 months ago
An empirical framework for designing social products
Designers generally agree that understanding the context of use is important in designing products. However, technologically advanced products such as personal robots engender com...
Bilge Mutlu
EUROSYS
2008
ACM
14 years 6 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler