Sciweavers

1530 search results - page 186 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
126
Voted
ACSAC
2005
IEEE
15 years 9 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
136
Voted
ICSOC
2004
Springer
15 years 9 months ago
Smart monitors for composed services
Service-based approaches are widely used to integrate heterogenous systems. Web services allow for the definition of highly dynamic systems where components (services) can be dis...
Luciano Baresi, Carlo Ghezzi, Sam Guinea
162
Voted
WSTFEUS
2003
IEEE
15 years 8 months ago
SCA-based Component Framework for Software Defined Radio
SCA (Software Communication Architecture), which has been adopted as a SDR (Software Defined Radio) Forum standard, provides a framework that successfully exploits common design p...
Saehwa Kim, Jamison Masse, Seongsoo Hong, Naehyuck...
165
Voted
MIDDLEWARE
2010
Springer
15 years 2 months ago
Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications
Abstract. While Web Services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virt...
Qi Huang, Daniel A. Freedman, Ymir Vigfusson, Ken ...
111
Voted
CCS
2009
ACM
15 years 10 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh