Sciweavers

589 search results - page 2 / 118
» Design and Implementation of an SSL Component Based on CBD
Sort
View
CN
2007
141views more  CN 2007»
13 years 7 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
ICCSA
2005
Springer
14 years 19 days ago
Variability Design and Customization Mechanisms for COTS Components
Component-Based Development (CBD) is gaining popularity as an effective reuse technology. Components in CBD are mainly for interorganizational reuse, rather than intra-organization...
Soo Dong Kim, Hyun Gi Min, Sung Yul Rhew
COMPSAC
2008
IEEE
14 years 1 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
OTM
2010
Springer
13 years 5 months ago
An Interaction Meta-model for Cooperative Component-Based User Interfaces
Abstract. Model Driven Engineering (MDE) aims to help software deto abstract the system implementations by means of models and meta-models. In Web-based Collaborative Information S...
Luis Iribarne, Nicolás Padilla, Javier Cria...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 1 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...