Sciweavers

1177 search results - page 80 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
ASPDAC
2007
ACM
108views Hardware» more  ASPDAC 2007»
14 years 24 days ago
Software Performance Estimation in MPSoC Design
- Estimation tools are a key component of system-level methodologies, enabling a fast design space exploration. Estimation of software performance is essential in current software-...
Márcio Oyamada, Flávio Rech Wagner, ...
SEKE
2005
Springer
14 years 2 months ago
Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models
Mobile agents provide an effective and flexible style to develop advanced distributed systems. In order to promote interoperability and ensure the quality of mobile agent systems,...
Junhua Ding, Dianxiang Xu, Yi Deng, Peter J. Clark...
EUROCRYPT
1997
Springer
14 years 29 days ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
JSS
2006
65views more  JSS 2006»
13 years 8 months ago
Patterns of conflict among software components
Integrating a system of disparate components to form a single application is still a daunting, high risk task, especially for components with heterogeneous communication expectati...
Michelle Hepner, Rose F. Gamble, Manasi Kelkar, Le...