Sciweavers

191 search results - page 14 / 39
» A Software Engineering Perspective for Services Security
Sort
View
ICSE
2007
IEEE-ACM
15 years 11 months ago
Migration of Legacy Assets to Service-Oriented Architecture Environments
This tutorial addresses the problem of the migration of legacy assets to Service-Oriented Architecture (SOA) environments. It addresses how to develop a realistic strategy for per...
Dennis B. Smith
134
Voted
ICSE
2001
IEEE-ACM
15 years 9 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
137
Voted
CCECE
2006
IEEE
15 years 11 months ago
A Survey of Secure B2C Commerce for Multicast Services
Services such as audio/video streaming, advertising, and software distribution can be delivered much more efficiently by Network Service Providers if multicast data distribution i...
Anil Kumar Venkataiahgari, J. William Atwood, Mour...
ICAIL
2007
ACM
15 years 9 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
143
Voted
CODES
2008
IEEE
15 years 11 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano