Sciweavers

690 search results - page 19 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
86
Voted
IASTEDSEA
2004
14 years 11 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling
ACSAC
2001
IEEE
15 years 1 months ago
A Component-Based Architecture for Secure Data Publication
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...
PROFES
2004
Springer
15 years 2 months ago
Using a Reference Application with Design Patterns to Produce Industrial Software
Abstract. System architectures are described in abstract terms, often using Design Patterns. Actual reuse based on such descriptions requires that each development project derive a...
Marek Vokác, Oluf Jensen
ATAL
2004
Springer
15 years 2 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
PDPTA
2000
14 years 11 months ago
Impact of Using Pattern-Based Systems on the Qualities of Parallel Applications
Abstract Design patterns are micro architectures, high-level building blocks which describe the solutions to speci c problems in software design. These solutions have generally bee...
Ladan Tahvildari, Ajit Singh