Sciweavers

2429 search results - page 213 / 486
» Using Aspects to Design a Secure System
Sort
View
ICSEA
2006
IEEE
15 years 9 months ago
Template-Based Development of Fault-Tolerant Embedded Software
— Currently there are different approaches to develop fault-tolerant embedded software: implementing the system from scratch or using libraries respectively specialized hardware....
Christian Buckl, Alois Knoll, Gerhard Schrott
138
Voted
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
15 years 10 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
142
Voted
EMSOFT
2004
Springer
15 years 9 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
117
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 3 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
114
Voted
UTP
2010
15 years 1 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob