Sciweavers

1801 search results - page 10 / 361
» Implementation-Oriented Secure Architectures
Sort
View
DRMTICS
2005
Springer
13 years 9 months ago
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran, Akhilesh Tyagi
MIDDLEWARE
2004
Springer
14 years 1 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
IEEEARES
2010
IEEE
13 years 6 months ago
A New DRM Architecture with Strong Enforcement
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Sascha Müller, Stefan Katzenbeisser
CAINE
2003
13 years 9 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
ICSR
2011
Springer
12 years 11 months ago
Software Reuse and Safety
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
William B. Frakes, John M. Favaro