Sciweavers

2236 search results - page 223 / 448
» Secure Software Design in Practice
Sort
View
112
Voted
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 9 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
133
Voted
PDC
2004
ACM
15 years 8 months ago
The impact of participation in information system design: a comparison of contextual placements
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Magnus Irestig, Henrik Eriksson, Toomas Timpka
PDCN
2004
15 years 4 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
87
Voted
CHI
2010
ACM
15 years 10 months ago
Designing with interactive example galleries
Designers often use examples for inspiration; examples offer contextualized instances of how form and content integrate. Can interactive example galleries bring this practice to e...
Brian Lee, Savil Srivastava, Ranjitha Kumar, Ronen...
234
Voted
POPL
2008
ACM
16 years 3 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk