Sciweavers

25 search results - page 1 / 5
» Security Patterns: A Method for Constructing Secure and Effi...
Sort
View
EDOC
2004
IEEE
13 years 8 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
LADC
2007
Springer
13 years 11 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
ICSE
2004
IEEE-ACM
14 years 5 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
SSR
2001
104views more  SSR 2001»
13 years 6 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
ITNG
2007
IEEE
13 years 11 months ago
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates
This contribution proposes a modification of method of divisors group operation in the Jacobian of hyperelliptic curve over even and odd characteristic fields in projective coordi...
Thomas Wollinger, Vladyslav Kovtun