Sciweavers

991 search results - page 76 / 199
» Foundations for Designing Secure Architectures
Sort
View
JSAC
2008
167views more  JSAC 2008»
15 years 1 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell
IEEEARES
2006
IEEE
15 years 8 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
IJET
2008
114views more  IJET 2008»
15 years 1 months ago
Proposal of convergence of e-Learning Systems for t-Learning
This article presents considerations about viability on reutilize existing web based e-Learning systems on Interactive Digital TV environment according to Digital TV standard adopt...
Barbara De Franco, Hilda Carvalho Oliveira, Everal...
87
Voted
DAC
2002
ACM
16 years 2 months ago
Constraint-driven communication synthesis
Constraint-driven Communication Synthesis enables the automatic design of the communication architecture of a complex system from a library of pre-defined Intellectual Property (I...
Alessandro Pinto, Luca P. Carloni, Alberto L. Sang...
INFOCOM
2008
IEEE
15 years 8 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan