Sciweavers

591 search results - page 15 / 119
» Securing the Broker Pattern
Sort
View
ATAL
2003
Springer
14 years 1 months ago
An incentive compatible reputation mechanism
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is ba...
Radu Jurca, Boi Faltings
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
14 years 14 days ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
INFSOF
2007
83views more  INFSOF 2007»
13 years 8 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
SPE
2010
91views more  SPE 2010»
13 years 3 months ago
Generalizable safety annotations for specification of failure patterns
Ian Wolforth, Martin Walker, Lars Grunske, Yiannis...
TDSC
2008
119views more  TDSC 2008»
13 years 8 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...