Sciweavers

690 search results - page 27 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
109
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
An Experience-Based Approach for Integrating Architecture and Requirements Engineering
Deriving requirements and architecture in concert implies the joint elicitation and specification of the problem and the structure of the solution. In this paper we argue that suc...
Adam Trendowicz, Allen H. Dutoit, Antje von Knethe...
131
Voted
ICSR
2009
Springer
15 years 10 months ago
Feature-Driven and Incremental Variability Generalization in Software Product Line
In the lifecycle of a software product line (SPL), incremental generalization is usually required to extend the variability of existing core assets to support the new or changed ap...
Liwei Shen, Xin Peng, Wenyun Zhao
126
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 9 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
176
Voted
TRUSTBUS
2007
Springer
15 years 9 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
151
Voted
USENIX
2004
15 years 5 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...