Sciweavers

8503 search results - page 105 / 1701
» Secure Software Architectures
Sort
View
DRM
2007
Springer
14 years 3 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
ICSE
2005
IEEE-ACM
14 years 9 months ago
Modeling and implementing software architecture with acme and archJava
We demonstrate a tool to incrementally synchronize an Acme architectural model described in the Acme Architectural Description Language (ADL) with an implementation in ArchJava, a...
Marwan Abi-Antoun, Jonathan Aldrich, David Garlan,...
APSEC
2006
IEEE
14 years 3 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan
WICSA
2008
13 years 10 months ago
Towards Software Architecture Physiology: Identifying Vital Components
Several architecture analysis methods are proposed in the literature for evaluating both the structure and the behavior of architectures. A parallel between humans and software sy...
Ilham Alloui, Sorana Cîmpan, Hervé Ve...