Sciweavers

2213 search results - page 125 / 443
» Software Security
Sort
View
IJOE
2008
107views more  IJOE 2008»
15 years 3 months ago
SOA Meets Robots - A Service-Based Software Infrastructure for Remote Laboratories
With the ongoing internationalization of virtual laboratories, the integration of such infrastructures becomes more important. The meanwhile commonly accepted 'glue' for...
Peter Tröger, Andreas Rasche, Frank Feinbube,...
125
Voted
IPPS
1999
IEEE
15 years 7 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 4 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
129
Voted
EUROSYS
2010
ACM
15 years 8 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
141
Voted
ICDCIT
2004
Springer
15 years 8 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland