Sciweavers

2056 search results - page 194 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
124
Voted
MOMPES
2008
IEEE
15 years 11 months ago
Architectural Concurrency Equivalence with Chaotic Models
During its lifetime, embedded systems go through multiple changes to their runtime architecture. That is, threads, processes, and processor are added or removed to/from the softwa...
Dionisio de Niz
134
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood
193
Voted
FASE
2008
Springer
15 years 6 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
ISPW
2010
IEEE
15 years 9 months ago
Software Process Model Blueprints
Abstract. Explicitly defining a software process model is widely recognized as a good software engineering practice. However, having a defined process does not necessarily mean tha...
Julio Ariel Hurtado Alegria, Alejandro Lagos, Alex...
ICSR
2009
Springer
15 years 9 months ago
Consistency Checking for Component Reuse in Open Systems
Large scale Open Systems are built from reusable components in such a way that enhanced system functionality can be deployed, quickly and effectively, simply by plugging in a few n...
Peter Henderson, Matthew J. Henderson