Sciweavers

8503 search results - page 278 / 1701
» Secure Software Architectures
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
IEEEARES
2007
IEEE
15 years 11 months ago
Secure Distributed Dossier Management in the Legal Domain
The use of digital dossiers in Courts of Law, although currently in the phase of study, will be common practice in the future. This paper introduces the notion of distributed digi...
Martijn Warnier, Frances M. T. Brazier, Martin Api...
ICSEA
2007
IEEE
15 years 11 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su
IEEEPACT
2002
IEEE
15 years 9 months ago
Software Bubbles: Using Predication to Compensate for Aliasing in Software Pipelines
This paper describes a technique for utilizing predication to support software pipelining on EPIC architectures in the presence of dynamic memory aliasing. The essential idea is t...
Benjamin Goldberg, Emily Crutcher, Chad Huneycutt,...
ICSE
1999
IEEE-ACM
15 years 9 months ago
Exploiting ADLs to Specify Architectural Styles Induced by Middleware Infrastructures
Architecture Definition Languages (ADLs) enable the formalization of the architecture of software systems and the execution of preliminary analyses on them. These analyses aim at...
Elisabetta Di Nitto, David S. Rosenblum