Sciweavers

2178 search results - page 299 / 436
» Toward Systemically Secure IT Architectures
Sort
View
WOSP
1998
ACM
14 years 6 days ago
Poems: end-to-end performance design of large parallel adaptive computational systems
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
Ewa Deelman, Aditya Dube, Adolfy Hoisie, Yong Luo,...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
14 years 8 days ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
ICWS
2003
IEEE
13 years 9 months ago
Access Control in Dynamic XML-Based Web-Services with X-RBAC
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
USITS
2003
13 years 9 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
ICSE
2001
IEEE-ACM
14 years 13 days ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts