Sciweavers

578 search results - page 2 / 116
» Correctness by Construction: Developing a Commercial Secure ...
Sort
View
JNCA
2006
86views more  JNCA 2006»
13 years 4 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
ADAEUROPE
2007
Springer
13 years 10 months ago
Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach
Current trends in software engineering promote the contention that the use of model-driven approaches should prove as beneficial to high-integrity systems as they have to business ...
Matteo Bordin, Tullio Vardanega
USENIX
2007
13 years 7 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
EDOC
2004
IEEE
13 years 8 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
ICSR
2011
Springer
12 years 8 months ago
Software Reuse and Safety
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
William B. Frakes, John M. Favaro