Sciweavers

8503 search results - page 275 / 1701
» Secure Software Architectures
Sort
View
CF
2004
ACM
15 years 10 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
TRUST
2010
Springer
15 years 10 months ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...
IRI
2006
IEEE
15 years 11 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
169
Voted
ATAL
2003
Springer
15 years 10 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
EUROMICRO
2006
IEEE
15 years 11 months ago
Moving Architectural Description from Under the Technology Lamppost
Software architecture description languages (ADLs) were a particularly active research area in the 1990s. In 2000, we published an extensive study of existing ADLs, which has serv...
Nenad Medvidovic