Sciweavers

690 search results - page 32 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
WEBI
2004
Springer
15 years 9 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
ACSAC
1999
IEEE
15 years 8 months ago
Architecture and Concepts of the ARGuE Guard
ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation. ARGuE is based on Network Associates' Gauntlet firewa...
Jeremy Epstein
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 10 months ago
Compositional Variability - Concepts and Patterns
Most software-intensive systems rely on a componentbased design and are therefore made up of encapsulated structural units which are hierarchically composed of one another. In thi...
Mark-Oliver Reiser, Ramin Tavakoli Kolagari, Matth...
143
Voted
CASES
2005
ACM
15 years 5 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
15 years 7 months ago
Service Oriented Device Integration - An Analysis of SOA Design Patterns
Service oriented device architecture (SODA) is a promising approach for overcoming interoperability issues and especially for extending the IT support of business processes to dev...
Christian Mauro, Jan Marco Leimeister, Helmut Krcm...