Sciweavers

191 search results - page 17 / 39
» Systematic Security Analysis for Service-Oriented Software A...
Sort
View
WOSP
2004
ACM
14 years 1 months ago
Experimenting different software architectures performance techniques: a case study
In this paper we describe our experience in performance analysis of the software architecture of the NICE case study which is responsible for providing several secure communicatio...
Simonetta Balsamo, Moreno Marzolla, Antinisca Di M...
ICSE
1993
IEEE-ACM
13 years 11 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan
STP
1998
150views more  STP 1998»
13 years 7 months ago
An architectural view of distributed objects and components in CORBA, Java RMI and COM/DCOM
The goal of this paper is to provide an architectural analysis of the existing distributed object oriented platforms. Based on a relatively small number of design patterns, our an...
Frantisek Plasil, Michael Stal
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 1 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
OOPSLA
2005
Springer
14 years 1 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...