Sciweavers

2504 search results - page 85 / 501
» Enterprise Security Architecture
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
ER
2006
Springer
121views Database» more  ER 2006»
15 years 3 months ago
Method Chunks for Interoperability
Interoperability is a key property of enterprise applications, which is hard to achieve due to the large number of interoperating components and semantic heterogeneity. Platform-ba...
Jolita Ralyté, Per Backlund, Harald Kü...
ACSAC
2000
IEEE
15 years 4 months ago
Security Architecture for Federated Cooperative Information Systems
The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
Pierre Bieber, D. Raujol, Pierre Siron
HPCA
2011
IEEE
14 years 3 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
IEEEARES
2006
IEEE
15 years 6 months ago
Towards a Security Architecture for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security i...
Klaus Plößl, Thomas Nowey, Christian Ml...