Sciweavers

2517 search results - page 23 / 504
» Secure Deployment of Components
Sort
View
INFORMATICASI
2010
13 years 7 months ago
A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?
Matthew E. Taylor, Christopher Kiekintveld, Craig ...
REFLECTION
2001
Springer
14 years 2 months ago
Performance and Integrity in the OpenORB Reflective Middleware
, are to address what we perceive as the most pressing shortcomings of current reflective middleware platforms. First, performance: in the worst case, this needs to be on a par wit...
Gordon S. Blair, Geoff Coulson, Michael Clarke, Ni...
CRITIS
2009
13 years 11 months ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
MA
2001
Springer
175views Communications» more  MA 2001»
14 years 2 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
CMS
2001
119views Communications» more  CMS 2001»
13 years 11 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...