Sciweavers

2213 search results - page 211 / 443
» Software Security
Sort
View
ICDCS
2008
IEEE
15 years 10 months ago
Updates and Asynchronous Communication in Trusted Computing Systems
Software-based usage controls typically are vulnerable to attacks. Trusted Platform Modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM...
José Carlos Brustoloni, David Kyle
CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 10 months ago
Data Preservation in High Energy Physics - why, how and when?
Long-term preservation of data and software of large experiments and detectors in high energy physics is of utmost importance to secure the heritage of (mostly unique) data and to...
Siegfried Bethke
ISSE
2010
15 years 2 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
ICSE
2007
IEEE-ACM
16 years 3 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
EGC
2005
Springer
15 years 9 months ago
M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid
Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
Robert John Walters, Stephen Crouch