Sciweavers

37 search results - page 6 / 8
» Enabling Trust with Behavior Metamodels
Sort
View
ECBS
2009
IEEE
193views Hardware» more  ECBS 2009»
13 years 3 months ago
CQML: Aspect-Oriented Modeling for Modularizing and Weaving QoS Concerns in Component-Based Systems
Current domain-specific modeling (DSM) frameworks for designing component-based systems often consider the system's structural and behavioral concerns as the two dominant con...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
DSN
2009
IEEE
14 years 16 days ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
13 years 5 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 7 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
ICSE
2008
IEEE-ACM
14 years 6 months ago
Symbolic mining of temporal specifications
Program specifications are important in many phases of the software development process, but they are often omitted or incomplete. An important class of specifications takes the f...
Mark Gabel, Zhendong Su