Sciweavers

45 search results - page 3 / 9
» Model-Driven Development Meets Security: An Evaluation of Cu...
Sort
View
ICPPW
2009
IEEE
13 years 5 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
ICSE
2009
IEEE-ACM
13 years 5 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
OOPSLA
2005
Springer
14 years 1 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui
I3E
2001
126views Business» more  I3E 2001»
13 years 9 months ago
Symbolon - A Novel Concept For Secure e-Commerce
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated secur...
Sebastian Fischmeister, Günther Hagleitner, W...
IJAMC
2008
76views more  IJAMC 2008»
13 years 7 months ago
The HyperVerse: concepts for a federated and Torrent-based '3D Web'
The vision of a "3D Web" as a combination of massive online virtual environments and today's WWW currently attracts a lot of attention. While it provides a multitude...
Jean Botev, Alexander Höhfeld, Hermann Schlos...