Sciweavers

2517 search results - page 56 / 504
» Secure Deployment of Components
Sort
View
ACISP
2004
Springer
15 years 8 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
AGENTS
2001
Springer
15 years 7 months ago
Building agents for service provisioning out of components
The CASA architecture describes a platform for the provisioning of services by agents by supporting three levels of agent design. At the base level is a framework to build an agen...
Ralf Sesseler
110
Voted
CIKM
2010
Springer
15 years 18 days ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
DAIS
2007
15 years 4 months ago
Component Adaptation in Contemporary Execution Environments
Because they are required to support component deployment and composition, modern execution environments embody a number of common features such as dynamic linking and support for ...
Susan Eisenbach, Chris Sadler, Dominic Wong
140
Voted
CBSE
2008
Springer
15 years 4 months ago
Life-Cycle Aware Modelling of Software Components
Current software component models insufficiently reflect the different stages of component life-cycle, which involves design, implementation, deployment, and runtime. Therefore, re...
Heiko Koziolek, Steffen Becker, Jens Happe, Ralf R...