Sciweavers

2281 search results - page 2 / 457
» Security Patterns and Secure Systems Design
Sort
View
AGENTS
1998
Springer
13 years 9 months ago
Agent Design Patterns: Elements of Agent Application Design
Yariv Aridor, Danny B. Lange
CAINE
2003
13 years 7 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
IEEEARES
2010
IEEE
14 years 12 days ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
TDSC
2008
119views more  TDSC 2008»
13 years 5 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 7 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...