Sciweavers

8503 search results - page 111 / 1701
» Secure Software Architectures
Sort
View
SEC
2007
13 years 10 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
ICSE
2008
IEEE-ACM
14 years 9 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
CSSE
2004
IEEE
13 years 8 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
ESSOS
2010
Springer
14 years 5 months ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
CISIS
2009
IEEE
14 years 3 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...