Sciweavers

8503 search results - page 187 / 1701
» Secure Software Architectures
Sort
View
COMPSAC
2000
IEEE
14 years 2 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
EUROSYS
2006
ACM
14 years 1 months ago
Context-specific middleware specialization techniques for optimizing software product-line architectures
Product-line architectures (PLA)s are an emerging paradigm for developing software families for distributed real-time and embedded (DRE) systems by customizing reusable artifacts,...
Arvind S. Krishna, Aniruddha S. Gokhale, Douglas C...
CSEE
2009
Springer
14 years 4 months ago
A Community of Learners Approach to Software Architecture Education
The wicked nature of software architecture calls for educational methodologies that deviate from the traditional active lecturer-passive student relation. In this paper we present...
Remco C. de Boer, Rik Farenhorst, Hans van Vliet
ESI
2010
97views more  ESI 2010»
13 years 8 months ago
A flexible streaming software architecture for scientific instruments
The recently completed prototyping efforts for a new type of riometer, the Advanced Rio-Imaging Experiment in Scandinavia (ARIES), required the development of a uniquely flexible s...
Martin Grill, Keith Barratt, Farideh Honary
ICSE
1997
IEEE-ACM
14 years 2 months ago
Argo: A Design Environment for Evolving Software Architectures
Software architectures evolve as the result of numerous, interrelated design decisions. At any point in an architecture’s evolution, current decisions can critically affect alte...
Jason E. Robbins, David M. Hilbert, David F. Redmi...