Sciweavers

1177 search results - page 87 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
MKWI
2008
168views Business» more  MKWI 2008»
13 years 10 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
CBMS
2008
IEEE
13 years 10 months ago
Workflow Integration in VL-e Medical
This paper presents the integration of a workflow management system into the VL-e Medical software architecture. Workflows are designed with the Taverna workbench, and then execute...
Tristan Glatard, Kamel Boulebiar, Sílvia D....
NDSS
2000
IEEE
14 years 1 months ago
Accountability and Control of Process Creation in Metasystems
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
EMSOFT
2007
Springer
14 years 3 months ago
Virtual execution of AADL models via a translation into synchronous programs
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended ...
Erwan Jahier, Nicolas Halbwachs, Pascal Raymond, X...
STORAGESS
2005
ACM
14 years 2 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...