Sciweavers

690 search results - page 60 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
124
Voted
ECBS
2009
IEEE
89views Hardware» more  ECBS 2009»
15 years 10 months ago
Optimisation Process for Maintaining Evolvability during Software Evolution
Software systems have to be changed continuously and evolutionarily throughout the whole time of their development and usage. Meanwhile, the software systems have to remain flexi...
Robert Brcina, Stephan Bode, Matthias Riebisch
JCS
2010
124views more  JCS 2010»
15 years 2 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
150
Voted
CAISE
2004
Springer
15 years 9 months ago
Achieving Enterprise Model Interoperability through the Model-Based Architecture Framework for Enterprises
This paper describes an ontology for enterprise modelling, The ontology has enabled conceptual integration of two different modelling methodologies, one based on UEML (Unified Ente...
Håvard D. Jørgensen, Oddrun Pauline O...
KBSE
2009
IEEE
15 years 10 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
CODES
2003
IEEE
15 years 9 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang