Sciweavers

2236 search results - page 54 / 448
» Secure Software Design in Practice
Sort
View
WIMOB
2007
IEEE
15 years 6 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
APSCC
2008
IEEE
15 years 1 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
ICSM
2008
IEEE
15 years 6 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
UIST
2009
ACM
15 years 4 months ago
A practical pressure sensitive computer keyboard
A pressure sensitive computer keyboard is presented that independently senses the force level on every depressed key. The design leverages existing membrane technologies and is su...
Paul H. Dietz, Benjamin D. Eidelson, Jonathan West...
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 5 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao