Sciweavers

8503 search results - page 75 / 1701
» Secure Software Architectures
Sort
View
SIGSOFT
2003
ACM
14 years 9 months ago
Making sense of runtime architecture for mobile phone software
We present a metamodel for runtime architecture and demonstrate with experimental results how this metamodel can be used to recover, analyze and improve runtime architecture of mo...
Alexander Ran, Raimondas Lencevicius
IEEESP
2007
98views more  IEEESP 2007»
13 years 8 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
CSFW
2008
IEEE
13 years 10 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...
GCC
2004
Springer
14 years 2 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
IJSEKE
2000
111views more  IJSEKE 2000»
13 years 8 months ago
An Approach to Quantitative Software Architecture Sensitivity Analysis
Software architectures are often claimed to be robust. However, there is no explicit and concrete definition of software architecture robustness. This paper gives a definition of ...
Chung-Horng Lung, Kalai Kalaichelvan