Sciweavers

8503 search results - page 70 / 1701
» Secure Software Architectures
Sort
View
120
Voted
FTDCS
1997
IEEE
15 years 6 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
124
Voted
JNW
2008
126views more  JNW 2008»
15 years 2 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
ESSOS
2009
Springer
15 years 6 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
168
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 6 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
101
Voted
CORR
2008
Springer
83views Education» more  CORR 2008»
15 years 2 months ago
Service Oriented Architecture in Network Security - a novel Organisation in Security Systems
Michael Hilker, Christoph Schommer