Sciweavers

690 search results - page 69 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
CASES
2007
ACM
15 years 8 months ago
Compiler generation from structural architecture descriptions
With increasing complexity of modern embedded systems, the availability of highly optimizing compilers becomes more and more important. At the same time, application specific inst...
Florian Brandner, Dietmar Ebner, Andreas Krall
ASPLOS
2008
ACM
15 years 5 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
106
Voted
ACSC
2008
IEEE
15 years 10 months ago
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes...
Will Tao, Robert Steele
158
Voted
SASO
2008
IEEE
15 years 10 months ago
A Middleware Architecture for Human-Centred Pervasive Adaptive Applications
As software is more and more interweaving with our everyday life, designing software in a way that it reflects and respects the user and her emotional physical conditions, cogniti...
Andreas Schroeder, Marjolein van der Zwaag, Moritz...
ICNP
2006
IEEE
15 years 10 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...