Sciweavers

591 search results - page 5 / 119
» Securing the Broker Pattern
Sort
View
ICDCS
2010
IEEE
14 years 14 days ago
Publisher Placement Algorithms in Content-Based Publish/Subscribe
—Many publish/subscribe systems implement a policy for clients to join to their physically closest broker to minimize transmission delays incurred on the clients’ messages. How...
Alex King Yeung Cheung, Hans-Arno Jacobsen
IEEEARES
2010
IEEE
14 years 3 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
QSIC
2007
IEEE
14 years 2 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
AGENTS
1998
Springer
14 years 24 days ago
Agent Design Patterns: Elements of Agent Application Design
Yariv Aridor, Danny B. Lange
OOPSLA
1990
Springer
14 years 18 days ago
Viewing Objects as Patterns of Communicating Agents
Oscar Nierstrasz, Michael Papathomas