Sciweavers

690 search results - page 14 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
ICEIS
2009
IEEE
14 years 7 months ago
Pattern-Based Refactoring of Legacy Software Systems
Rearchitecturing large software systems becomes more and more complex after years of development and a growing size of the code base. Nonetheless, a constant adaptation of software...
Sascha Hunold, Björn Krellner, Thomas Rauber,...
JPDC
2006
141views more  JPDC 2006»
14 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
HIPEAC
2005
Springer
15 years 3 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
CCS
2007
ACM
15 years 3 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
80
Voted
P2P
2008
IEEE
138views Communications» more  P2P 2008»
15 years 3 months ago
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance
We present a content delivery infrastructure distributing and maintaining software packages in a large organization. Our work based on a trace-based analysis of an existing softwa...
Purvi Shah, Jehan-François Pâris, Jef...