Sciweavers

933 search results - page 123 / 187
» Secure Software Architectures Design by Aspect Orientation
Sort
View
SACMAT
2011
ACM
12 years 12 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
TRUST
2009
Springer
14 years 3 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
COMPSAC
2008
IEEE
13 years 10 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
AOSD
2010
ACM
14 years 3 months ago
From aspect-oriented models to aspect-oriented code?: the maintenance perspective
Aspect-Oriented Modeling (AOM) provides support for separating concerns at the design level. Even though most AOM approaches provide means to execute the composition of the modula...
Aram Hovsepyan, Riccardo Scandariato, Stefan Van B...
VLDB
2005
ACM
184views Database» more  VLDB 2005»
14 years 9 months ago
Rule-based workflow management for bioinformatics
We describe a data-centric software architecture for bioinformatics workflows and a rule-based workflow enactment system that uses declarative specifications of data dependences be...
John S. Conery, Julian Catchen, Michael Lynch