Sciweavers

8503 search results - page 316 / 1701
» Secure Software Architectures
Sort
View
125
Voted
SELMAS
2004
Springer
15 years 10 months ago
Systematic Integration Between Requirements and Architecture
Software systems of today are characterized by the increasing size, complexity, distribution and heterogeneity. Understanding and supporting the interaction between software requi...
Lúcia R. D. Bastos, Jaelson Brelaz de Castr...
SIGSOFT
1996
ACM
15 years 9 months ago
Using Object-Oriented Typing to Support Architectural Design in the C2 Style
Abstract -- Software architectures enable large-scale software development. Component reuse and substitutability, two key aspects of large-scale development, must be planned for du...
Nenad Medvidovic, Peyman Oreizy, Jason E. Robbins,...
EDO
2006
Springer
15 years 8 months ago
Tailoring an architectural middleware platform to a heterogeneous embedded environment
Embedded systems are rapidly growing in size, complexity, distribution, and heterogeneity. As a result, the traditional practice of developing one-off embedded applications that a...
Sam Malek, Chiyoung Seo, Nenad Medvidovic
158
Voted
DAC
2010
ACM
15 years 8 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
INFSOF
2002
108views more  INFSOF 2002»
15 years 4 months ago
Architectural styles for distributed processing systems and practical selection method
The software architecture of a system has influences against various software characteristics of the system such as efficiency, reliability, maintainability, and etc.. For support...
Yoshitomi Morisawa, Katsuro Inoue, Koji Torii