Sciweavers

3516 search results - page 477 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
119
Voted
IADIS
2003
15 years 6 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
143
Voted
USS
2004
15 years 6 months ago
Privtrans: Automatically Partitioning Programs for Privilege Separation
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are...
David Brumley, Dawn Xiaodong Song
ASE
1998
152views more  ASE 1998»
15 years 4 months ago
Apel: A Graphical Yet Executable Formalism for Process Modeling
Software process improvement requires high level formalisms for describing project-specific, organizational and quality aspects. These formalisms must be convenient not only for ...
Samir Dami, Jacky Estublier, Mahfoud Amiour
WORM
2003
15 years 6 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
WSC
2004
15 years 6 months ago
The Use of Simulation to Support Major Transportation Planning Decisions
When major transportation infrastructures such as freight corridors or port systems are being planned, there are typically multiple phases of preliminary engineering required. Dur...
Beth C. Kulick