Sciweavers

2337 search results - page 5 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
AGENTS
2001
Springer
14 years 6 hour ago
Architectural design of a multi-agent system for handling metadata streams
Ï Ú × Ò ÑÙÐØ ¹ ÒØ Ö Ø ØÙÖ ØÓ Ð Ú Ö Ñ Ø ¹ Ø ×ØÖ Ñ× ×ÝÒ ÖÓÒÓÙ×ÐÝ Û Ø ÑÙÐØ Ñ ×ØÖ Ñ× ÓÚ Ö Û ¹ Ö Ò ØÛÓÖ º ÌÓ Ø × Ò...
Don Cruickshank, Luc Moreau, David De Roure
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 1 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
MKWI
2008
160views Business» more  MKWI 2008»
13 years 9 months ago
Architectural Design of Flexible Process Management Technology
: To provide effective support, process-aware information systems (PAIS) must not freeze existing business processes. Instead they should enable authorized users to deviate on-the-...
Manfred Reichert, Peter Dadam, Martin Jurisch, Ulr...
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
DAC
2009
ACM
14 years 2 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou