Sciweavers

991 search results - page 29 / 199
» Foundations for Designing Secure Architectures
Sort
View
FMCO
2003
Springer
145views Formal Methods» more  FMCO 2003»
15 years 3 months ago
Causality and Scheduling Constraints in Heterogeneous Reactive Systems Modeling
Recently we proposed a mathematical framework offering diverse models of computation and a formal foundation for correct-byconstruction deployment of synchronous designs over dist...
Albert Benveniste, Benoît Caillaud, Luca P. ...
COLCOM
2007
IEEE
15 years 4 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...
CCS
2011
ACM
13 years 10 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
HCI
2009
14 years 7 months ago
Towards a Computational Model of Perception and Action in Human Computer Interaction
The evaluation and design of user interfaces may be facilitated by using performance models based on cognitive architectures. A recent trend in HCI is the increased focus on percep...
Pascal Haazebroek, Bernhard Hommel
DKE
2002
130views more  DKE 2002»
14 years 9 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber