Sciweavers

2056 search results - page 147 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
EMSOFT
2004
Springer
15 years 9 months ago
Reuse of software in distributed embedded automotive systems
Until recently, in the automotive industry, reuse of software has entirely been a typical activity of suppliers. They try to reduce the increasing software development costs that ...
Bernd Hardung, Thorsten Kölzow, Andreas Kr&uu...
129
Voted
ESSOS
2010
Springer
16 years 1 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
MOBISYS
2004
ACM
16 years 3 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
CSMR
2004
IEEE
15 years 7 months ago
The Weighted Combined Algorithm: A Linkage Algorithm for Software Clustering
Software systems need to evolve as business requirements, technology and environment change. As software is modified to accommodate the required changes, its structure deteriorate...
Onaiza Maqbool, Haroon A. Babri
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason