Sciweavers

8503 search results - page 169 / 1701
» Secure Software Architectures
Sort
View
IBMRD
2007
47views more  IBMRD 2007»
13 years 10 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
ICSE
2008
IEEE-ACM
14 years 10 months ago
Reference architecture knowledge representation: an experience
Software architectures have played a significant role in determining the success of software systems. In spite of impact of the architectures to the software development and, as a...
Elisa Yumi Nakagawa, José Carlos Maldonado
IPPS
2008
IEEE
14 years 4 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
TRUST
2010
Springer
14 years 3 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
WICSA
2008
13 years 11 months ago
Can Styles Improve Architectural Pattern Reuse?
Software patterns are generic solutions to recurring problems. They are represented as a triplet (problem, context, solution). Several kinds of software patterns were identified, ...
Sorana Cîmpan, Vincent Couturier