Sciweavers

1177 search results - page 7 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ITCC
2005
IEEE
14 years 2 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
CONPAR
1994
14 years 21 days ago
A Software Architecture for Multidisciplinary Applications: Integrating Task and Data Parallelism
Data parallel languages such as Vienna Fortran and HPF can be successfully applied to a wide range of numerical applications. However, many advanced scienti c and engineering appl...
Barbara M. Chapman, Piyush Mehrotra, John Van Rose...
ICSE
2005
IEEE-ACM
14 years 8 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
CASES
2005
ACM
13 years 10 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
EMSOFT
2004
Springer
14 years 2 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter