Sciweavers

151 search results - page 24 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
RE
2001
Springer
14 years 1 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
ICSE
2007
IEEE-ACM
14 years 9 months ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...
ECSA
2007
Springer
14 years 3 months ago
Pattern-Based Evolution of Software Architectures
Abstract. We propose a pattern-based software development method comprising analysis (using problem frames) and design (using architectural and design patterns), of which especiall...
Isabelle Côté, Maritta Heisel, Ina We...
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 2 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
EWSA
2005
Springer
14 years 2 months ago
Architecture Description for Mobile Distributed Systems
Abstract. In this paper we motivate an Architecture Description Language (ADL) for mobile distributed systems based on the π-calculus. Different from other approaches, the non-fu...
Volker Gruhn, Clemens Schäfer