Sciweavers

690 search results - page 53 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
ISORC
2007
IEEE
15 years 10 months ago
Real-Time Dynamic Guarantee in Component-Based Middleware
This paper describes an extension to the componentbased programming model to support real-time dynamic guarantee for distributed applications. The extended model aims to include a...
Cássia Yuri Tatibana, Carlos Montez, R&ocir...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
16 years 4 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
SACMAT
2009
ACM
15 years 10 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
STEP
2003
IEEE
15 years 9 months ago
Transforming Legacy Web Applications to the MVC Architecture
With the rapid changes that occur in the area of Web technologies, the porting and adaptation of existing Web applications into new platforms that take advantage of modern technol...
Yu Ping, Kostas Kontogiannis, Terence C. Lau
CASES
2001
ACM
15 years 7 months ago
Tailoring pipeline bypassing and functional unit mapping to application in clustered VLIW architectures
In this paper we describe a design exploration methodology for clustered VLIW architectures. The central idea of this work is a set of three techniques aimed at reducing the cost ...
Marcio Buss, Rodolfo Azevedo, Paulo Centoducatte, ...