Sciweavers

991 search results - page 49 / 199
» Foundations for Designing Secure Architectures
Sort
View
CCS
2007
ACM
15 years 4 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
IEEEARES
2008
IEEE
15 years 4 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
PFE
2001
Springer
15 years 2 months ago
Introducing Product Lines in Small Embedded Systems
: How do you introduce product lines into a hardware dominated organization that has increasing software architecture awareness and products with extremely limited memory resources...
Christoph Stoermer, Markus Roeddiger
SMC
2010
IEEE
159views Control Systems» more  SMC 2010»
14 years 8 months ago
Mobile interaction with smart environments through linked data
This paper presents the design and architecture of an integrated environment that provides location independent and mobile access to Intelligent Domotic Environments. The envision...
Faisal Razzak, Dario Bonino, Fulvio Corno
WICSA
2008
14 years 11 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...