Sciweavers

2517 search results - page 59 / 504
» Secure Deployment of Components
Sort
View
TRUSTBUS
2010
Springer
15 years 14 days ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
125
Voted
CSMR
2006
IEEE
15 years 8 months ago
A Refactoring-based Tool for Software Component Adaptation
Abstract— Adapting software components usable by a particular application is a crucial issue in software component based technology. In fact, software components can be used in c...
Gautier Bastide
117
Voted
SIS
2004
15 years 4 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
130
Voted
ESAS
2004
Springer
15 years 8 months ago
A Security Architecture for Mobile Wireless Sensor Networks
Abstract. Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deployi...
Stefan Schmidt, Holger Krahn, Stefan Fischer, Diet...
GSEM
2004
Springer
15 years 8 months ago
Enhancing Java Grid Computing Security with Resource Control
Abstract. This paper outlines an original Computational Grid deployment protocol which is entirely based on Java, leveraging the portability of this language for distributing custo...
Jarle Hulaas, Walter Binder, Giovanna Di Marzo Ser...