Sciweavers

2337 search results - page 50 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
IJSTM
2000
117views more  IJSTM 2000»
13 years 7 months ago
Architectural design support for business process and business network engineering
Abstract: Concurrent enterprises and networks of business processes cannot function without each other. Cooperation in networks allows for faster reaction to business opportunities...
Henry M. Franken, René Bal, Harmen van den ...
IPPS
1998
IEEE
13 years 12 months ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre
ICDCSW
2005
IEEE
14 years 1 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ASPLOS
2009
ACM
14 years 8 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
AIS
2004
Springer
14 years 1 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim