Sciweavers

8503 search results - page 146 / 1701
» Secure Software Architectures
Sort
View
IJCAI
2001
13 years 10 months ago
A software architecture for dynamically generated adaptive Web stores
We provide technical details about the software and hardware architecture of SETA, a prototype toolkit for the creation of Web stores which personalize the interaction with custom...
Liliana Ardissono, Anna Goy, Giovanna Petrone, Mar...
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 1 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
ESORICS
2002
Springer
14 years 8 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 2 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
WISER
2004
ACM
14 years 2 months ago
Software, architecture, and participatory design
Much work in software architecture has been inspired by work in physical architecture, in particular Alexander’s work on ‘design patterns’. By contrast, Alexander’s work i...
Stephen Rank, Carl O'Coill, Cornelia Boldyreff, Ma...