Sciweavers

2429 search results - page 96 / 486
» Using Aspects to Design a Secure System
Sort
View
OOPSLA
2007
Springer
14 years 3 months ago
Supporting systems QoS design and evolution through model transformations
We describe Quality of service pICKER (QUICKER), a model-driven QoS mapping toolchain for supporting the QoS design and evolution of systems software. QUICKER automates the mappin...
Amogh Kavimandan, Aniruddha S. Gokhale
WSC
2007
13 years 11 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
IJNSEC
2008
140views more  IJNSEC 2008»
13 years 9 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
NBIS
2009
Springer
14 years 1 months ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
CSREAESA
2003
13 years 10 months ago
Designing an Embedded Electronic-Prescription Application for Home-Based Telemedicine Using OSGi Framework?
The combined benefits of Open Services Gateway Initiative (OSGi) and Smart card technologies in embedded devices have made the two technologies suitable for developing middleware ...
Patrick O. Bobbie, Sailaja H. Ramisetty, Abdul-Lat...