Sciweavers

270 search results - page 31 / 54
» Building Software Securely from the Ground Up
Sort
View
SIGUCCS
2000
ACM
15 years 2 months ago
Where the Students Are...Computing Services at the Customer Source
Information and Access Technology Services at the University of Missouri-Columbia has long struggled with its physical location on the edge of campus. In my 20+ years of experienc...
Glenda E. Moum
ICFEM
2009
Springer
15 years 4 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy
RSP
2000
IEEE
108views Control Systems» more  RSP 2000»
15 years 2 months ago
Using MetaScribe to Prototype an UML to C++/Ada95 Code Generator
: The use of program generation from graphical representations like UML is increasing in software projects. The notion of hypergenericity is raising up to improve program generator...
Dan Marius Regep, Fabrice Kordon
SIGOPSE
2004
ACM
15 years 3 months ago
Open problems in data collection networks
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of ...
Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Me...
ACSAC
2003
IEEE
15 years 3 months ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin