Sciweavers

2236 search results - page 141 / 448
» Secure Software Design in Practice
Sort
View
ESOA
2006
15 years 8 months ago
Design Patterns for Decentralised Coordination in Self-organising Emergent Systems
There is little or no guidance to systematically design a self-organising emergent solution that achieves the desired macroscopic behaviour. This paper describes decentralised coor...
Tom De Wolf, Tom Holvoet
EMSOFT
2004
Springer
15 years 9 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
ICSE
2003
IEEE-ACM
16 years 4 months ago
A Model and a Design Approach to Building QoS Adaptive Systems
The paper introduces a system model called the probabilistic asynchronous model which characterises the context in which many practical and the Internet-based applications are bui...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
OOPSLA
2000
Springer
15 years 7 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
CCS
2008
ACM
15 years 6 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...