Sciweavers

8503 search results - page 167 / 1701
» Secure Software Architectures
Sort
View
TEC
2002
166views more  TEC 2002»
13 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
P2P
2003
IEEE
14 years 3 months ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner
INFSOF
2010
95views more  INFSOF 2010»
13 years 8 months ago
Characterizing software architecture changes: A systematic review
With today’s ever increasing demands on software, software developers must produce software that can be changed without the risk of degrading the software architecture. One way ...
Byron J. Williams, Jeffrey C. Carver
PERCOM
2005
ACM
14 years 9 months ago
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard...
CCS
2010
ACM
13 years 10 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...