Sciweavers

2236 search results - page 272 / 448
» Secure Software Design in Practice
Sort
View
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 8 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
HOTDEP
2008
126views Hardware» more  HOTDEP 2008»
15 years 5 months ago
Toward Quantifying System Manageability
Manageability directly influences a system's reliability, availability, security, and safety, thus being a key ingredient of system dependability. Alas, we do not have today ...
George Candea
JIPS
2010
162views more  JIPS 2010»
14 years 9 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
ICCAD
2006
IEEE
141views Hardware» more  ICCAD 2006»
15 years 12 months ago
A code refinement methodology for performance-improved synthesis from C
Although many recent advances have been made in hardware synthesis techniques from software programming languages such as C, the performance of synthesized hardware commonly suffe...
Greg Stitt, Frank Vahid, Walid A. Najjar
CASES
2008
ACM
15 years 5 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar