Sciweavers

1801 search results - page 39 / 361
» Implementation-Oriented Secure Architectures
Sort
View
COLCOM
2007
IEEE
14 years 2 months ago
Secure scripting based composite application development: Framework, architecture, and implementation
—Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started ...
Tom Dinkelaker, Alisdair Johnstone, Yücel Kar...
IPPS
2007
IEEE
14 years 2 months ago
A Global Security Architecture for Intrusion Detection on Computer Networks
— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bido...
ACSAC
1999
IEEE
14 years 8 days ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
KSEM
2010
Springer
13 years 5 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...