Sciweavers

1177 search results - page 54 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ACMSE
2008
ACM
13 years 10 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
CCS
2009
ACM
14 years 3 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 19 days ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
AGENTS
1999
Springer
14 years 1 months ago
A Catalog of Agent Coordination Patterns
This paper surveys the current state of the art in agentoriented software engineering, focusing on the area of coordinated multi-agent systems. In multi-agent systems, the interac...
Sandra C. Hayden, Christina Carrick, Qiang Yang
IEEESCC
2010
IEEE
13 years 10 months ago
SecureSOA
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide...
Michael Menzel, Christoph Meinel