Sciweavers

933 search results - page 98 / 187
» Secure Software Architectures Design by Aspect Orientation
Sort
View
PPPJ
2006
ACM
14 years 3 months ago
Mapping clouds of SOA- and business-related events for an enterprise cockpit in a Java-based environment
This paper is about business process management (BPM) and business activity monitoring (BAM) using event processing. We will show why the management of business processes is impor...
Daniel Jobst, Gerald Preissler
GPCE
2007
Springer
14 years 3 months ago
A type-centric framework for specifying heterogeneous, large-scale, component-oriented, architectures
Maintaining integrity, consistency, and enforcing conformance in architectures of large-scale systems requires specification and enforcement of many different forms of structural...
Georg Jung, John Hatcliff
DRM
2005
Springer
14 years 2 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
CASES
2005
ACM
13 years 11 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
ECLIPSE
2006
ACM
14 years 3 months ago
HAM: cross-cutting concerns in Eclipse
As programs evolve, newly added functionality sometimes no longer aligns with the original design, ending up scattered across the software system. Aspect mining tries to identify ...
Silvia Breu, Thomas Zimmermann, Christian Lindig