Sciweavers

276 search results - page 2 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
13 years 10 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
FASE
2004
Springer
13 years 10 months ago
Systematic Testing of Software Architectures in the C2 Style
The topic of software architecture (SA) based testing has recently raised some interest. Recent work on the topic has used the SA as a reference model for code conformance testing,...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
KBSE
2010
IEEE
13 years 3 months ago
RESISTing reliability degradation through proactive reconfiguration
Situated software systems are an emerging class of systems that are predominantly pervasive, embedded, and mobile. They are marked with a high degree of unpredictability and dynam...
Deshan Cooray, Sam Malek, Roshanak Roshandel, Davi...
ICEIS
2008
IEEE
13 years 11 months ago
A Metadata-Driven Approach for Aspect-Oriented Requirements Analysis
This paper presents a metadata-driven approach based on aspect-oriented requirements analysis. This approach has been defined in cooperation with the European Space Agency in the ...
Sérgio Agostinho, Ana Moreira, André...
TDSC
2008
119views more  TDSC 2008»
13 years 4 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...