Sciweavers

1801 search results - page 54 / 361
» Memory-Centric Security Architecture
Sort
View
WWW
2005
ACM
16 years 2 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
IEEEARES
2009
IEEE
15 years 8 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
USS
2008
15 years 4 months ago
Experiment Isolation in a Secure Cluster Testbed
A major class of network emulation testbeds is based on the Utah Emulab design: a local cluster of experimental nodes interconnected through Ethernet switches using VLANs. The VLA...
Kevin Lahey, Robert Braden, Keith Sklower
SCN
2008
Springer
140views Communications» more  SCN 2008»
15 years 1 months ago
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
The Multimedia Broadcast Multicast Service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved M...
Simone Teofili, Michele Di Mascolo, Cristina Basil...