Sciweavers

18094 search results - page 10 / 3619
» The Architecture of Secure Systems
Sort
View
HIPEAC
2005
Springer
15 years 4 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
SIGOPSE
1998
ACM
15 years 3 months ago
Security architecture for component-based operating systems
Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko...
98
Voted
ACSW
2006
15 years 15 days ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
112
Voted
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
15 years 26 days ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...