Sciweavers

591 search results - page 13 / 119
» Securing the Broker Pattern
Sort
View
OOPSLA
1998
Springer
14 years 24 days ago
How to Preserve the Benefits of Design Patterns
The rapid evolution of Design Patterns has hampered the benefits gained from using Design Patterns. The increase in the number of Design Patterns makes a common vocabulary unmanag...
Ellen Agerbo, Aino Cornils
ICWS
2004
IEEE
13 years 10 months ago
Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging
This paper presents an emerging tool for security configuration of service-oriented architectures with Web Services. Security is a major concern when implementing mission-critical...
Michiaki Tatsubori, Takeshi Imamura, Yuhichi Nakam...
CAINE
2003
13 years 10 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
DEBS
2007
ACM
14 years 15 days ago
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Publish/subscribe systems provide an efficient, event-based, wide-area distributed communications infrastructure. Large scale publish/subscribe systems are likely to employ compon...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
APSEC
2007
IEEE
14 years 2 months ago
1st International Workshop on Software Patterns and Quality (SPAQu'07)
Although numbers of software pattern catalogues and languages have been published, little is known about quality of patterns, quality by patterns and quality aspects of pattern ac...
Hironori Washizaki, Nobukazu Yoshioka