Sciweavers

3516 search results - page 434 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
146
Voted
CCS
2000
ACM
15 years 9 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
IEEESP
2006
108views more  IEEESP 2006»
15 years 4 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
DAC
1997
ACM
15 years 9 months ago
Hardware/Software Co-Simulation in a VHDL-Based Test Bench Approach
Novel test bench techniques are required to cope with a functional test complexity which is predicted to grow much more strongly than design complexity. Our test bench approach at...
Matthias Bauer, Wolfgang Ecker
CAISE
2006
Springer
15 years 8 months ago
Enhancing trust and buy-in from business: a platform for business -driven development of B2B transactions
A measure for the quality of software is the extent to which it corresponds to the business objectives and requirements it was designed for. The earlier those who elicit the requir...
Michael Schmitt, Bertrand Grégoire, Stefan ...
WWW
2006
ACM
16 years 5 months ago
Capturing RIA concepts in a web modeling language
This work addresses conceptual modeling and automatic code generation for Rich Internet Applications, a variant of Web-based systems bridging the gap between desktop and Web inter...
Alessandro Bozzon, Sara Comai, Piero Fraternali, G...