Sciweavers

2236 search results - page 151 / 448
» Secure Software Design in Practice
Sort
View
EUROSYS
2010
ACM
15 years 9 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
ESWA
2006
96views more  ESWA 2006»
15 years 4 months ago
Identifying requirements for communication support: A maturity grid-inspired approach
Communication is a critical success factor in design. It can be seen as the social and cognitive process by which information is selected, messages are exchanged between interacti...
Anja M. Maier, Claudia M. Eckert, P. John Clarkson
ESORICS
2008
Springer
15 years 6 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
CODES
2007
IEEE
15 years 10 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
111
Voted
COMPSEC
2006
90views more  COMPSEC 2006»
15 years 4 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...