Sciweavers

8503 search results - page 262 / 1701
» Secure Software Architectures
Sort
View
WCRE
2002
IEEE
15 years 9 months ago
Practice Patterns for Architecture Reconstruction
Architecture reconstruction embodies benefits for commercial organizations. Reconstructing or recovering the architecture of software systems is primarily driven by the increased ...
Christoph Stoermer, Liam O'Brien, Chris Verhoef
BIRTHDAY
2006
Springer
15 years 8 months ago
Composition by Colimit and Formal Software Development
Abstract. Goguen emphasized long ago that colimits are how to compose systems [7]. This paper corroborates and elaborates Goguen's vision by presenting a variety of situations...
Douglas R. Smith
CLUSTER
2007
IEEE
15 years 4 months ago
The computer as software component: A mechanism for developing and testing resource management software
— In this paper, we present an architecture that encapsulates system hardware inside a software component used for job execution and status monitoring. The development of this in...
Narayan Desai, Theron Voran, Ewing L. Lusk, Andrew...
SAFECOMP
2009
Springer
15 years 9 months ago
A Foundation for Requirements Analysis of Dependable Software
We present patterns for expressing dependability requirements, such as confidentiality, integrity, availability, and reliability. The paper considers random faults as well as cert...
Denis Hatebur, Maritta Heisel
SICHERHEIT
2010
15 years 2 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel