Sciweavers

2517 search results - page 58 / 504
» Secure Deployment of Components
Sort
View
129
Voted
GPCE
2005
Springer
15 years 8 months ago
Component-Oriented Programming with Sharing: Containment is Not Ownership
Abstract. Component-oriented programming yields a tension between higherorder features (deployment, reconfiguration, passivation), encapsulation, and component sharing. We propose...
Daniel Hirschkoff, Tom Hirschowitz, Damien Pous, A...
123
Voted
PERCOM
2005
ACM
16 years 2 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
139
Voted
MBEES
2010
15 years 1 months ago
Test Case Integration: From Components to Systems
In a component-based development approach system integration generally implies the packaging and deployment of a group of software components on hardware units, possibly hiding th...
Bernhard Schätz, Christian Pfaller
116
Voted
CONEXT
2007
ACM
15 years 6 months ago
Securing BGP incrementally
Despite the pressing need to secure routing, none of the existing secure variants of BGP has been widely deployed. Due to the size and decentralized nature of the Internet, it bec...
Martin Suchara, Ioannis C. Avramopoulos, Jennifer ...
117
Voted
SICHERHEIT
2010
15 years 14 days ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius