Sciweavers

2517 search results - page 31 / 504
» Secure Deployment of Components
Sort
View
IEEESCC
2007
IEEE
15 years 8 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
ICSE
2009
IEEE-ACM
15 years 5 days ago
A non-intrusive component-based approach for deploying unanticipated self-management behaviour
Supporting self-management behaviour by means of component-based architectural solutions has been the focus of many current research projects. In such a context, handling unantici...
Sandro Santos Andrade, Raimundo José de Ara...
EUROMICRO
2009
IEEE
15 years 9 months ago
A Component-Based Technology for Hardware and Software Components
One of the challenges in development of embedded systems is to cope with hardware and software components simultaneously. Often is their integration cumbersome due to their incomp...
Luka Lednicki, Ana Petricic, Mario Zagar
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
15 years 9 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
SACMAT
2009
ACM
15 years 9 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...