Sciweavers

2429 search results - page 32 / 486
» Using Aspects to Design a Secure System
Sort
View
EDO
2006
Springer
13 years 11 months ago
Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network
In this paper we present Damon, a decentralized wide-area runtime aspect middleware built on top of a structured peer-topeer (p2p) substrate and a dynamic Aspect Oriented Programm...
Rubén Mondéjar, Pedro García ...
BIS
2008
174views Business» more  BIS 2008»
13 years 9 months ago
Web2Train: a Design Model for Corporate e-Learning Systems
Web2.0 has revolutionized the way we use the Web by opening the doors of collaborative learning and direct communication and making the web an open source for learning and exchangi...
Katerina Papanikolaou, Stephanos Mavromoustakos
ISSRE
2007
IEEE
13 years 9 months ago
Testing Security Policies: Going Beyond Functional Testing
While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper i...
Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry
EDOC
2004
IEEE
13 years 11 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
SOUPS
2009
ACM
14 years 2 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...