Sciweavers

902 search results - page 40 / 181
» Security and Trust Requirements Engineering
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...
ICSE
2003
IEEE-ACM
15 years 9 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
99
Voted
SIGSOFT
2010
ACM
14 years 7 months ago
Separation of concerns for dependable software design
For `mixed-criticality' systems that have both critical and non-critical functions, the greatest leverage on dependability may be at the design level. By designing so that ea...
Daniel Jackson, Eunsuk Kang
SEC
2007
14 years 11 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser
TRUST
2010
Springer
14 years 8 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte