Sciweavers

2337 search results - page 91 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
OSDI
2006
ACM
15 years 10 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
AAAI
1994
14 years 11 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...
AOSE
2001
Springer
15 years 2 months ago
Towards an ADL for Designing Agent-Based Systems
In this paper, we describe the Architecture Description Language (ADL) that we are defining for the design of agentbased systems. This aims at filing the gap between the analysis ...
Marie-Pierre Gervais, Florin Muscutariu
CASCON
1996
111views Education» more  CASCON 1996»
14 years 11 months ago
A hybrid process for recovering software architecture
A large portion of the software used in industry today is legacy software. Legacy systems often evolve into dicult to maintain systems whose original design has been lost or else ...
Vassilios Tzerpos, Richard C. Holt
SIGADA
2004
Springer
15 years 3 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton