Sciweavers

2517 search results - page 133 / 504
» Secure Deployment of Components
Sort
View
149
Voted
ESORICS
2008
Springer
15 years 5 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
162
Voted
ICWS
2007
IEEE
15 years 5 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
162
Voted
IJES
2006
134views more  IJES 2006»
15 years 3 months ago
Applying model-driven development to distributed real-time and embedded avionics systems
Model-driven development (MDD) is an emerging paradigm that uses domain-specific modeling languages (DSMLs) and generative technologies to provide "correct-by-construction&quo...
Krishnakumar Balasubramanian, Arvind S. Krishna, E...
119
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Kai Rannenberg, Giovanni Iachello
133
Voted
CD
2005
Springer
15 years 9 months ago
A Decentralized Redeployment Algorithm for Improving the Availability of Distributed Systems
In distributed and mobile environments, the connections among the hosts on which a software system is running are often unstable. As a result of connectivity losses, the overall a...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic