Sciweavers

1177 search results - page 62 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
WIMOB
2007
IEEE
14 years 3 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 3 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
ICDCSW
2005
IEEE
14 years 2 months ago
An Intermediary Software Infrastructure for Edge Services
We describe the goals and architecture of a new framework that aims at facilitating the deployment of adaptation services running on intermediate edge servers. The main goal is to...
Raffaella Grieco, Delfina Malandrino, Vittorio Sca...
CSMR
2006
IEEE
14 years 2 months ago
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations
Software-intensive systems evolve continuously under the pressure of new and changing requirements, generally leading to an increase in overall system complexity. In this respect,...
Igor Ivkovic, Kostas Kontogiannis
SOCIALCOM
2010
13 years 6 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen