Sciweavers

1801 search results - page 35 / 361
» Memory-Centric Security Architecture
Sort
View
AGENTS
2000
Springer
15 years 6 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...
JHSN
2006
96views more  JHSN 2006»
15 years 1 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
JSW
2008
122views more  JSW 2008»
15 years 1 months ago
Security of Distributed Digital Criminal Dossiers
Abstract-- Securely managing shared information in distributed environments across multiple organisations is a challenge. Distributed information management systems must be able to...
Martijn Warnier, Frances M. T. Brazier, Anja Oskam...
SEKE
2007
Springer
15 years 8 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
15 years 9 days ago
State-of-the-art in heterogeneous computing
Node level heterogeneous architectures have become attractive during the last decade for several reasons: compared to traditional symmetric CPUs, they offer high peak performance a...
André Rigland Brodtkorb, Christopher Dyken,...