Sciweavers

15 search results - page 2 / 3
» iceccs 2005
Sort
View
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
13 years 11 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
13 years 11 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
13 years 11 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
13 years 11 months ago
Scavenging Complex Genomic Information Using Mobile Code: An Evaluation
Mobile code solutions can improve the performances of applications over the Internet by reducing the amount of data that must be transferred across the network. The research on ge...
Mauro Pezzè, Davide Tosi, Gian Pietro Picco
ICECCS
2005
IEEE
89views Hardware» more  ICECCS 2005»
13 years 11 months ago
A Tool-Supported Approach to Testing UML Design Models
For Model Driven Development approaches to succeed, there is a need for model validation techniques. This paper presents an approach to testing designs described by UML class diag...
Trung T. Dinh-Trong, Nilesh Kawane, Sudipto Ghosh,...