Sciweavers

4330 search results - page 40 / 866
» Analyzing security architectures
Sort
View
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
14 years 21 days ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
ISI
2006
Springer
13 years 7 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...
ESSOS
2011
Springer
12 years 11 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
DISCEX
2003
IEEE
14 years 20 days ago
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer
This paper proposes several integrated security architecture designs for client-server group communication systems. In an integrated architecture, security services are implemente...
Yair Amir, Cristina Nita-Rotaru, Jonathan Robert S...
IEEEARES
2006
IEEE
14 years 1 months ago
A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems
Johannes Osrael, Lorenz Froihofer, Karl M. Gö...