Sciweavers

991 search results - page 136 / 199
» Foundations for Designing Secure Architectures
Sort
View
DGO
2009
112views Education» more  DGO 2009»
14 years 11 months ago
System demonstration: Metavid.org: a social website and open archive of congressional video
We have developed Metavid.org, a site that archives video footage of the U.S. Senate and House floor proceedings. Visitors can search for who said what when and also download, rem...
Michael Dale, Abram Stern, Mark Deckert, Warren Sa...
GPCE
2008
Springer
14 years 11 months ago
On the modularity of feature interactions
Feature modules are the building blocks of programs in software product lines (SPLs). A foundational assumption of feature-based program synthesis is that features are composed in...
Chang Hwan Peter Kim, Christian Kästner, Don ...
MMMACNS
2001
Springer
15 years 2 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
ICISC
2008
129views Cryptology» more  ICISC 2008»
14 years 11 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar
OOPSLA
2005
Springer
15 years 3 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman