Sciweavers

434 search results - page 52 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
JCIT
2010
131views more  JCIT 2010»
13 years 3 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
ICSE
2007
IEEE-ACM
14 years 9 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
ACSAC
2006
IEEE
14 years 3 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
DAGSTUHL
2009
13 years 10 months ago
Engineering Self-Adaptive Systems through Feedback Loops
To deal with the increasing complexity of software systems and uncertainty of their environments, software engineers have turned to self-adaptivity. Self-adaptive systems are capab...
Yuriy Brun, Giovanna Di Marzo Serugendo, Cristina ...
WICSA
2008
13 years 10 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...