Sciweavers

2056 search results - page 190 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
144
Voted
B
2007
Springer
15 years 8 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
135
Voted
WCRE
1999
IEEE
15 years 8 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
CASES
2005
ACM
15 years 6 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
DRM
2008
Springer
15 years 6 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
ICSEA
2008
IEEE
15 years 11 months ago
Analyzing Software Evolvability of an Industrial Automation Control System: A Case Study
Evolution of software systems is characterized by inevitable changes of software and increasing software complexity, which in turn may lead to huge maintenance and development cos...
Hongyu Pei Breivold, Ivica Crnkovic, Rikard Land, ...