Sciweavers

8503 search results - page 167 / 1701
» Secure Software Architectures
Sort
View
120
Voted
TEC
2002
166views more  TEC 2002»
15 years 1 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
100
Voted
P2P
2003
IEEE
15 years 7 months ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner
101
Voted
INFSOF
2010
95views more  INFSOF 2010»
15 years 20 days ago
Characterizing software architecture changes: A systematic review
With today’s ever increasing demands on software, software developers must produce software that can be changed without the risk of degrading the software architecture. One way ...
Byron J. Williams, Jeffrey C. Carver
77
Voted
PERCOM
2005
ACM
16 years 1 months ago
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard...
CCS
2010
ACM
15 years 2 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...