Sciweavers

589 search results - page 2 / 118
» Design and Implementation of an SSL Component Based on CBD
Sort
View
CN
2007
141views more  CN 2007»
13 years 4 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
ICCSA
2005
Springer
13 years 10 months ago
Variability Design and Customization Mechanisms for COTS Components
Component-Based Development (CBD) is gaining popularity as an effective reuse technology. Components in CBD are mainly for interorganizational reuse, rather than intra-organization...
Soo Dong Kim, Hyun Gi Min, Sung Yul Rhew
COMPSAC
2008
IEEE
13 years 11 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
OTM
2010
Springer
13 years 3 months ago
An Interaction Meta-model for Cooperative Component-Based User Interfaces
Abstract. Model Driven Engineering (MDE) aims to help software deto abstract the system implementations by means of models and meta-models. In Web-based Collaborative Information S...
Luis Iribarne, Nicolás Padilla, Javier Cria...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
13 years 11 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...