Sciweavers

690 search results - page 23 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
131
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
116
Voted
IEEESCC
2008
IEEE
15 years 10 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu
114
Voted
CIARP
2004
Springer
15 years 9 months ago
Parallel Algorithm for Extended Star Clustering
In this paper we present a new parallel clustering algorithm based on the extended star clustering method. This algorithm can be used for example to cluster massive data sets of do...
Reynaldo Gil-García, José Manuel Bad...
123
Voted
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 9 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
155
Voted
APAQS
2001
IEEE
15 years 7 months ago
Object-Oriented Program Behavior Analysis Based on Control Patterns
Code-patterns are statically recurring structure specific to a programming language. It can be parallel to aid in designing software systems for solving particular problems. Contr...
C.-C. Hwang, S.-K. Huang, D.-J. Chen, D. Chen