Sciweavers

2517 search results - page 25 / 504
» Secure Deployment of Components
Sort
View
EDO
2005
Springer
14 years 3 months ago
Generating connectors for heterogeneous deployment
re connector is an abstraction capturing interactions among components. Apart from middleware independence, connectors provide additional services (e.g., adaptation, synchronizati...
Ondrej Galik, Tomás Bures
SE
2007
13 years 11 months ago
Enterprise application deployment: A model driven approach
Abstract: Today’s enterprise applications are based on numerous interrelated components that capture domain-specific, generic or infrastructural functionality. Each component is...
Peter Golibrzuch, Alexander Holbreich, Simon Zambr...
IDTRUST
2010
ACM
13 years 8 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
JUCS
2010
89views more  JUCS 2010»
13 years 8 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
ASWEC
2006
IEEE
14 years 4 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han