Sciweavers

690 search results - page 51 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
CODES
2005
IEEE
15 years 9 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
CCS
2007
ACM
15 years 10 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
DAC
2006
ACM
15 years 7 months ago
IMPRES: integrated monitoring for processor reliability and security
Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even `trusted so...
Roshan G. Ragel, Sri Parameswaran
JSW
2008
105views more  JSW 2008»
15 years 3 months ago
Formal Models for Architecture Aspects and Their Weaving
Aspect-oriented concepts are currently introduced in early stages of software development to achieve better separation of concerns. However, at the architecture level, there exists...
Chunhua Yang, Haiyang Wang
HICSS
2002
IEEE
105views Biometrics» more  HICSS 2002»
15 years 8 months ago
Towards a Tool Support for a Living Software Development Process
Change and evolution of business and technology imply change and evolution of development processes. Besides that for a certain enterprise or a project we will usually integrate e...
Michael Gnatz, Frank Marschall, Gerhard Popp, Andr...