Sciweavers

2236 search results - page 168 / 448
» Secure Software Design in Practice
Sort
View
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
15 years 10 months ago
Security Conscious Web Service Composition with Semantic Web Support
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web ...
Barbara Carminati, Elena Ferrari, Ryan Bishop, Pat...
FOSSACS
2004
Springer
15 years 9 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
MM
2003
ACM
262views Multimedia» more  MM 2003»
15 years 9 months ago
ARMS: adaptive rich media secure streaming
In this demonstration we present the ARMS system which enables secure and adaptive rich media streaming to a large-scale, heterogeneous client population. The ARMS system dynamica...
Lisa Amini, Raymond Rose, Chitra Venkatramani, Oli...
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 9 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
OOPSLA
2010
Springer
15 years 2 months ago
Concurrency by modularity: design patterns, a case in point
General purpose object-oriented programs typically aren’t embarrassingly parallel. For these applications, finding enough concurrency remains a challenge in program design. To ...
Hridesh Rajan, Steven M. Kautz, Wayne Rowcliffe