Sciweavers

2236 search results - page 121 / 448
» Secure Software Design in Practice
Sort
View
SAC
2002
ACM
15 years 4 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
TOSEM
2002
118views more  TOSEM 2002»
15 years 4 months ago
Modeling software architectures in the Unified Modeling Language
Abstract. The Unified Modeling Language (UML) is a family of design notations that is rapidly becoming a de facto standard software design language. UML provides a variety of usefu...
Nenad Medvidovic, David S. Rosenblum, David F. Red...
SP
2007
IEEE
15 years 10 months ago
Using Rescue Points to Navigate Software Recovery
We present a new technique that enables software recovery in legacy applications by retrofitting exception-handling capabilities, error virtualization using rescue points. We int...
Stelios Sidiroglou, Oren Laadan, Angelos D. Keromy...
ICSE
2005
IEEE-ACM
15 years 10 months ago
How to teach software modeling
To enhance motivation of students to study software engineering, some way of finding balance between the scientific aspect and the practical aspect of software engineering is re...
Tetsuo Tamai
SOSP
2009
ACM
16 years 1 months ago
Fast byte-granularity software fault isolation
Bugs in kernel extensions remain one of the main causes of poor operating system reliability despite proposed techniques that isolate extensions in separate protection domains to ...
Miguel Castro, Manuel Costa, Jean-Philippe Martin,...