Sciweavers

991 search results - page 5 / 199
» Foundations for Designing Secure Architectures
Sort
View
AGENTS
2001
Springer
15 years 2 months ago
Architectural design of a multi-agent system for handling metadata streams
Ï Ú × Ò ÑÙÐØ ¹ ÒØ Ö Ø ØÙÖ ØÓ Ð Ú Ö Ñ Ø ¹ Ø ×ØÖ Ñ× ×ÝÒ ÖÓÒÓÙ×ÐÝ Û Ø ÑÙÐØ Ñ ×ØÖ Ñ× ÓÚ Ö Û ¹ Ö Ò ØÛÓÖ º ÌÓ Ø × Ò...
Don Cruickshank, Luc Moreau, David De Roure
OOPSLA
2009
Springer
15 years 4 months ago
The design of a task parallel library
The Task Parallel Library (TPL) is a library for .NET that makes it easy to take advantage of potential parallelism in a program. The library relies heavily on generics and delega...
Daan Leijen, Wolfram Schulte, Sebastian Burckhardt
FOSAD
2009
Springer
15 years 4 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
IEEEARES
2009
IEEE
15 years 4 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
15 years 3 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...