Sciweavers

1770 search results - page 65 / 354
» Writing requirements in computer security
Sort
View
MIDDLEWARE
2004
Springer
14 years 2 months ago
Exploring adaptability of secure group communication using formal prototyping techniques
Traditionally, adaptability in communication frameworks has been restricted to predefined choices without taking into consideration tradeoffs between them and the application req...
Sebastian Gutierrez-Nolasco, Nalini Venkatasubrama...
SC
2000
ACM
14 years 1 months ago
Extending OpenMP for NUMA Machines
This paper describes extensions to OpenMP that implement data placement features needed for NUMA architectures. OpenMP is a collection of compiler directives and library routines ...
John Bircsak, Peter Craig, RaeLyn Crowell, Zarka C...
WISE
2009
Springer
14 years 6 months ago
Security Policy Definition Framework for SOA-Based Systems
This paper presents an extended architecture of a policy definition framework fine-tuned for service-oriented environments conforming to the SOA distributed processing paradigm. We...
Bartosz Brodecki, Piotr Sasak, Michal Szychowiak
IEEEARES
2008
IEEE
14 years 3 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
CCS
2007
ACM
14 years 29 days ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...