Sciweavers

1801 search results - page 47 / 361
» Implementation-Oriented Secure Architectures
Sort
View
ATC
2007
Springer
14 years 2 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...
PERCOM
2004
ACM
14 years 7 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
ACSAC
2006
IEEE
13 years 11 months ago
CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection
Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a t...
Guillaume Duc, Ronan Keryell
FPL
2008
Springer
112views Hardware» more  FPL 2008»
13 years 9 months ago
Secure FPGA configuration architecture preventing system downgrade
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Benoît Badrignans, Reouven Elbaz, Lionel Tor...
VAMOS
2007
Springer
14 years 2 months ago
KumbangSec: An Approach for Modelling Functional and Security Variability in Software Architectures
Software products often need to vary in terms of functionality, but also in terms of quality attributes. We describe KumbangSec, which in an approach for modelling functional and ...
Varvana Myllärniemi, Mikko Raatikainen, Tomi ...