Sciweavers

331 search results - page 17 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
P2P
2003
IEEE
100views Communications» more  P2P 2003»
15 years 3 months ago
Identity Crisis: Anonymity vs. Reputation in P2P Systems
The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much deb...
Sergio Marti, Hector Garcia-Molina
SACMAT
2004
ACM
15 years 3 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
SEKE
2005
Springer
15 years 3 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
COMPSAC
2004
IEEE
15 years 1 months ago
Safety Tactics for Software Architecture Design
The influence of architecture in assurance of system safety is being increasingly recognised in mission-critical software applications. Nevertheless, most architectural strategies...
Weihang Wu, Tim Kelly