Sciweavers

2517 search results - page 111 / 504
» Secure Deployment of Components
Sort
View
AUSFORENSICS
2004
15 years 4 months ago
Implementing network defence using deception in a wireless honeypot
The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transm...
Suen Yek
148
Voted
SAC
2008
ACM
15 years 3 months ago
Autonomic management policy specification in Tune
Distributedsoftwareenvironmentsareincreasinglycomplex anddiculttomanage,astheyintegratevariouslegacysoftware with specic management interfaces. Moreover, the factthatmanagementtas...
Laurent Broto, Daniel Hagimont, Patricia Stolf, No...
128
Voted
ECIS
2003
15 years 4 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
128
Voted
EUROPAR
2005
Springer
15 years 9 months ago
A Generic Language for Dynamic Adaptation
Today, component oriented middlewares are used to design, develop and deploy distributed applications easily. They ensure the heterogeneity, interoperability, and reuse of software...
Assia Hachichi, Gaël Thomas, Cyril Martin, Be...
OOPSLA
2005
Springer
15 years 9 months ago
Parametric polymorphism for software component architectures
Parametric polymorphism has become a common feature of mainstream programming languages, but software component architectures have lagged behind and do not support it. We examine ...
Cosmin E. Oancea, Stephen M. Watt