Sciweavers

84 search results - page 2 / 17
» 04511 Abstracts Collection - Architecting Systems with Trust...
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
13 years 5 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
VLSISP
2008
134views more  VLSISP 2008»
13 years 5 months ago
Calibration of Abstract Performance Models for System-Level Design Space Exploration
ion of Abstract Performance Models for System-Level Design Space Exploration ANDY D. PIMENTEL, MARK THOMPSON, SIMON POLSTRA AND CAGKAN ERBAS Computer Systems Architecture Group, In...
Andy D. Pimentel, Mark Thompson, Simon Polstra, Ca...
CASSIS
2005
Springer
13 years 10 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
ICSE
2007
IEEE-ACM
14 years 5 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
MSR
2010
ACM
13 years 10 months ago
Finding file clones in FreeBSD Ports Collection
Abstract—In Open Source System (OSS) development, software components are often imported and reused; for this reason we might expect that files are copied in multiple projects (...
Yusuke Sasaki, Tetsuo Yamamoto, Yasuhiro Hayase, K...