Sciweavers

262 search results - page 7 / 53
» Providing Trusted Components to the Industry
Sort
View
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
15 years 3 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
SIGADA
2004
Springer
15 years 2 months ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis
78
Voted
PROFES
2004
Springer
15 years 2 months ago
Using a Reference Application with Design Patterns to Produce Industrial Software
Abstract. System architectures are described in abstract terms, often using Design Patterns. Actual reuse based on such descriptions requires that each development project derive a...
Marek Vokác, Oluf Jensen
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Tension between Integration and Fragmentation in a Component Based Software Development Ecosystem
Historically, software application systems have been produced either individually tailored for the specific customer, or they have been adapted from standardized packages. This pa...
Jens-Magnus Arndt, Jens Dibbern
WWW
2008
ACM
15 years 10 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...