Sciweavers

589 search results - page 1 / 118
» Design and Implementation of an SSL Component Based on CBD
Sort
View
ASIASIM
2004
Springer
13 years 10 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
13 years 9 months ago
Taming the component timing: A CBD methodology for real-time embedded systems
—The growing trend towards using component based design approach in embedded system development requires addressing newer system engineering challenges. These systems are usually...
Manoj G. Dixit, Pallab Dasgupta, S. Ramesh
ESSOS
2010
Springer
14 years 1 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
SASO
2007
IEEE
13 years 10 months ago
Adaptive SSL: Design, Implementation and Overhead Analysis
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Christiaan J. Lamprecht, Aad P. A. van Moorsel
JITECH
2007
147views more  JITECH 2007»
13 years 4 months ago
Re-engineering at LeCroy Corporation: The move to component-based systems
This case study discusses two related aspects that are becoming increasingly important in today’s software development practice: re-engineering of a monolithic system into a com...
Julia Kotlarsky