Sciweavers

193 search results - page 14 / 39
» Maintaining Software with a Security Perspective
Sort
View
ICSE
1994
IEEE-ACM
15 years 1 months ago
SAAM: A Method for Analyzing the Properties of Software Architectures
While software architecture has become an increasingly important research topic in recent years, insufficient attention has been paid to methods for evaluation of these architectu...
Rick Kazman, Leonard J. Bass, Mike Webb, Gregory D...
74
Voted
DSN
2002
IEEE
15 years 2 months ago
On the Placement of Software Mechanisms for Detection of Data Errors
An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between ...
Martin Hiller, Arshad Jhumka, Neeraj Suri
LATINCRYPT
2010
14 years 8 months ago
A Lattice-Based Threshold Ring Signature Scheme
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar’s code-based solution to use the short integer solution (SIS) problem as securi...
Pierre-Louis Cayrel, Richard Lindner, Markus R&uum...
COMPSAC
2006
IEEE
15 years 1 months ago
A Service-Oriented Design Framework for Secure Network Applications
Abstract---Service Oriented Architecture (SOA) is an architectural style to reuse and integrate existing systems for designing new applications. Each application is designed in an ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
TRUST
2010
Springer
15 years 2 months ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...