Sciweavers

690 search results - page 5 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
82
Voted
CSREASAM
2006
14 years 11 months ago
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services
- In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payme...
Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary...
ITCC
2005
IEEE
15 years 3 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
TRUSTBUS
2010
Springer
14 years 7 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
RTCSA
2005
IEEE
15 years 3 months ago
Extending Software Communications Architecture for QoS Support in SDR Signal Processing
The Software Communications Architecture (SCA) defined by Joint Tactical Radio Systems (JTRS) is the de facto standard middleware currently adopted by the Software Defined Radio (...
Jaesoo Lee, Jiyong Park, Seunghyun Han, Seongsoo H...
IWPC
1996
IEEE
15 years 1 months ago
A Formal Architectural Design Patterns-Based Approach to Software Understanding
Mastering the complexity of programs and systems, particularly distributed systems, should lead to signi cant improvements in program and system understanding. In this paper we pr...
Paulo S. C. Alencar, Donald D. Cowan, Thomas Kunz,...