Sciweavers

1177 search results - page 58 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
LAWEB
2005
IEEE
14 years 2 months ago
Web Development Evolution: The Assimilation of Web Engineering Security
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security iss...
William Bradley Glisson, Ray Welland
APSEC
2004
IEEE
14 years 15 days ago
JCMP: Linking Architecture with Component Building
Approaches to enforcing communication integrity in the implementation, exemplified by ArchJava, consider only architectural constraints, without taking into account the late integ...
Guoqing Xu, Zongyuan Yang, Haitao Huang
CODES
2005
IEEE
14 years 2 months ago
Power-smart system-on-chip architecture for embedded cryptosystems
In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...
ACSAC
2005
IEEE
14 years 2 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
OOPSLA
2005
Springer
14 years 2 months ago
Modeling architectural patterns using architectural primitives
Architectural patterns are a key point in architectural documentation. Regrettably, there is poor support for modeling architectural patterns, because the pattern elements are not...
Uwe Zdun, Paris Avgeriou