Sciweavers

2213 search results - page 90 / 443
» Software Security
Sort
View
CLUSTER
2002
IEEE
15 years 8 months ago
A New Architecture for Secure Carrier-Class Clusters
Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective ha...
Makan Pourzandi, Ibrahim Haddad, Charles Levert, M...
99
Voted
WWW
2010
ACM
15 years 10 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
JAR
2006
99views more  JAR 2006»
15 years 3 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...
WKDD
2008
CPS
97views Data Mining» more  WKDD 2008»
15 years 9 months ago
Knowledge Management in the Ubiquitous Software Development
The continuous technical advances have lead to the proliferation of very small and very cheap microprocessors, equipped with sensors and capacity of wireless communication. The in...
José Miguel Rubio León
AGENTS
1997
Springer
15 years 7 months ago
Creatures: Artificial Life Autonomous Software Agents for Home Entertainment
This paper gives a technical description of Creatures, a commercial home-entertainment software package. Creatures provides a simulated environment in which exist a number of synt...
Stephen Grand, Dave Cliff, Anil Malhotra