Sciweavers

8503 search results - page 281 / 1701
» Secure Software Architectures
Sort
View
ICECCS
2008
IEEE
203views Hardware» more  ICECCS 2008»
15 years 11 months ago
Using AADL to Model a Protocol Stack
In recent trends, the Architecture Analysis and Design Language (AADL) has received increasing attention from safety-critical software development industries. Specific about the A...
Didier Delanote, Stefan Van Baelen, Wouter Joosen,...
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 10 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
158
Voted
ETRICS
2006
15 years 8 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
CBSE
2007
Springer
15 years 11 months ago
Monitoring Architectural Properties in Dynamic Component-Based Systems
Henry Muccini, Andrea Polini, Fabiano Ricci, Anton...