Sciweavers

276 search results - page 29 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 7 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
VL
2008
IEEE
133views Visual Languages» more  VL 2008»
15 years 7 months ago
Analyzing a socio-technical visualization tool using usability inspection methods
Ariadne is a novel visualization tool that allows end users to explore the socio-technical relationships in software development projects. Essentially the visualization is a varia...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
RE
2005
Springer
15 years 7 months ago
Personal and Contextual Requirements Engineering
A framework for requirements analysis is proposed that accounts for individual and personal goals, and the effect of time and context on personal requirements. The implications of...
Alistair G. Sutcliffe, Stephen Fickas, McKay Moore...
PLDI
2012
ACM
13 years 3 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
SOSE
2008
IEEE
15 years 7 months ago
Ontology for Service Oriented Testing of Web Services
This paper presents a service oriented architecture for testing Web Services. In this architecture, various parties interoperate with each other to complete testing tasks through ...
Yufeng Zhang, Hong Zhu