The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
—Much of modern software development consists of building on older changes. Older periods provide the structure (e.g., functions and data types) on which changes in future period...
This paper details the implementation of a software framework that aids the development of distributed and self-configurable software systems. This framework is an instance of a n...
David Lillis, Rem W. Collier, Mauro Dragone, Grego...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...