Sciweavers

8503 search results - page 117 / 1701
» Secure Software Architectures
Sort
View
CCGRID
2005
IEEE
14 years 2 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
HICSS
1998
IEEE
135views Biometrics» more  HICSS 1998»
14 years 1 months ago
The Architecture of Secure Systems
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...
Jim Alves-Foss
COMCOM
2002
143views more  COMCOM 2002»
13 years 8 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
ICCS
2005
Springer
14 years 2 months ago
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coar...
Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Youn...
APSEC
2006
IEEE
13 years 11 months ago
Using Operational Architecture to Model Embedded Software
Almost methods in embedded software modeling take software architecture as one of the crucial parts of the design process. Since a principal role of embedded software is the inter...
Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae