Sciweavers

8503 search results - page 156 / 1701
» Secure Software Architectures
Sort
View
JSS
2006
99views more  JSS 2006»
13 years 9 months ago
Software architecture-based regression testing
When architecting dependable systems, in addition to improving system dependability by means of construction (fault-tolerant and redundant mechanisms, for instance), it is also im...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
ECOOPW
1999
Springer
14 years 1 months ago
Managing Unanticipated Evolution of Software Architectures
Few existing approaches towards architectural evolution deal with unanticipated evolution. This is an important restriction, since a lot of architectural changes are very di cult ...
Kim Mens, Tom Mens, Bart Wouters, Roel Wuyts
ISPW
1996
IEEE
14 years 1 months ago
An open architecture for software process asset reuse
Barry Boehm, Universityof Southern Calfornia Steven Wolf, Rockwell Collins The development and reuse of sofhvare engineering processes within an organization can be impeded by the...
Barry W. Boehm, Steven Wolf
SWS
2004
ACM
14 years 2 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley
PERCOM
2004
ACM
14 years 8 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark