Sciweavers

8503 search results - page 80 / 1701
» Secure Software Architectures
Sort
View
85
Voted
DAC
2005
ACM
15 years 5 months ago
A pattern matching coprocessor for network security
Young H. Cho, William H. Mangione-Smith
122
Voted
EDO
2000
Springer
15 years 7 months ago
Architectural Reflection: Realising Software Architectures via Reflective Activities
Architectural reflection is the computation performed by a software system about its own software architecture. Building on previous research and on practical experience in industr...
Francesco Tisato, Andrea Savigni, Walter Cazzola, ...
94
Voted
DATE
2003
IEEE
99views Hardware» more  DATE 2003»
15 years 8 months ago
Software Architectural Transformations: A New Approach to Low Energy Embedded Software
Tat Kee Tan, Anand Raghunathan, Niraj K. Jha
118
Voted
CCS
2007
ACM
15 years 9 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...