Sciweavers

991 search results - page 61 / 199
» Foundations for Designing Secure Architectures
Sort
View
128
Voted
SACMAT
2010
ACM
15 years 7 days ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
123
Voted
VTC
2010
IEEE
114views Communications» more  VTC 2010»
14 years 11 months ago
A Secure Multi-Application Platform for Vehicle Telematics
Contemporary vehicles offer an advanced telematics platform with multiple applications available such as electronic road tolling, emergency call, breakdown call, or route planning....
Jef Maerien, Sam Michiels, Stefan Van Baelen, Chri...
CCS
2009
ACM
15 years 8 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 7 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
SQJ
2010
152views more  SQJ 2010»
15 years 6 days ago
Design pattern evolutions in QVT
One of the main goals of design patterns is to design for change. Many design patterns leave some room for future changes and evolutions. The application of design patterns leads ...
Jing Dong, Yajing Zhao, Yongtao Sun