Sciweavers

132 search results - page 3 / 27
» An Architectural Foundation for Security Model Sharing and R...
Sort
View
JSW
2008
105views more  JSW 2008»
13 years 6 months ago
Formal Models for Architecture Aspects and Their Weaving
Aspect-oriented concepts are currently introduced in early stages of software development to achieve better separation of concerns. However, at the architecture level, there exists...
Chunhua Yang, Haiyang Wang
CC
2010
Springer
190views System Software» more  CC 2010»
14 years 1 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 4 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
ICWS
2010
IEEE
13 years 7 months ago
A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures
Service-oriented Architectures support the provision, discovery, and usage of services in different application contexts. The Web Service specifications provide a technical founda...
Michael Menzel, Robert Warschofsky, Christoph Mein...
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
14 years 18 days ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré