Sciweavers

1587 search results - page 170 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
WICSA
2004
15 years 6 months ago
An Externalized Infrastructure for Self-Healing Systems
Software architecture descriptions can play a wide variety of roles in the software lifecycle, from requirements specification, to logical design, to implementation architectures....
David S. Wile, Alexander Egyed
CSFW
2006
IEEE
15 years 11 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
SAC
2006
ACM
15 years 11 months ago
Lost in just the translation
This paper describes the design and implementation of a scheme for hiding information in translated natural language text, and presents experimental results using the implemented ...
Ryan Stutsman, Christian Grothoff, Mikhail J. Atal...
124
Voted
ESORICS
2005
Springer
15 years 10 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 11 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco