Sciweavers

2429 search results - page 319 / 486
» Using Aspects to Design a Secure System
Sort
View
CSREASAM
2010
14 years 7 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
WETICE
2003
IEEE
15 years 3 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deļ¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
ICDCS
2010
IEEE
14 years 11 months ago
Efficient Workstealing for Multicore Event-Driven Systems
Many high-performance communicating systems are designed using the event-driven paradigm. As multicore platforms are now pervasive, it becomes crucial for such systems to take adva...
Fabien Gaud, Sylvain Geneves, Renaud Lachaize, Bap...
SIGOPSE
2004
ACM
15 years 3 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
88
Voted
ICSE
2001
IEEE-ACM
15 years 2 months ago
A Scenario-Driven Approach to Traceability
Design traceability has been widely recognized as being an integral aspect of software development. In the past years this fact has been amplified due to the increased use of lega...
Alexander Egyed