Sciweavers

8503 search results - page 105 / 1701
» Secure Software Architectures
Sort
View
112
Voted
DRM
2007
Springer
15 years 8 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
118
Voted
ICSE
2005
IEEE-ACM
16 years 2 months ago
Modeling and implementing software architecture with acme and archJava
We demonstrate a tool to incrementally synchronize an Acme architectural model described in the Acme Architectural Description Language (ADL) with an implementation in ArchJava, a...
Marwan Abi-Antoun, Jonathan Aldrich, David Garlan,...
115
Voted
APSEC
2006
IEEE
15 years 8 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan
WICSA
2008
15 years 4 months ago
Towards Software Architecture Physiology: Identifying Vital Components
Several architecture analysis methods are proposed in the literature for evaluating both the structure and the behavior of architectures. A parallel between humans and software sy...
Ilham Alloui, Sorana Cîmpan, Hervé Ve...