Sciweavers

2429 search results - page 86 / 486
» Using Aspects to Design a Secure System
Sort
View
ECEASST
2010
13 years 3 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
CCE
2010
13 years 6 months ago
Combined mass and energy integration in process design at the example of membrane-based gas separation systems
This paper presents an approach for combined mass and energy integration in process synthesis and illustrates it at the thermochemical production of crude synthetic natural gas (S...
Martin Gassner, François Maréchal
OSDI
2008
ACM
14 years 9 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
FMICS
2006
Springer
14 years 22 days ago
Verified Design of an Automated Parking Garage
Parking garages that stow and retrieve cars automatically are becoming viable solutions for parking shortages. However, these are complex systems and a number of severe incidents i...
Aad Mathijssen, A. Johannes Pretorius
USS
2008
13 years 11 months ago
Experiment Isolation in a Secure Cluster Testbed
A major class of network emulation testbeds is based on the Utah Emulab design: a local cluster of experimental nodes interconnected through Ethernet switches using VLANs. The VLA...
Kevin Lahey, Robert Braden, Keith Sklower