Sciweavers

2517 search results - page 25 / 504
» Secure Deployment of Components
Sort
View
EDO
2005
Springer
15 years 5 months ago
Generating connectors for heterogeneous deployment
re connector is an abstraction capturing interactions among components. Apart from middleware independence, connectors provide additional services (e.g., adaptation, synchronizati...
Ondrej Galik, Tomás Bures
SE
2007
15 years 1 months ago
Enterprise application deployment: A model driven approach
Abstract: Today’s enterprise applications are based on numerous interrelated components that capture domain-specific, generic or infrastructural functionality. Each component is...
Peter Golibrzuch, Alexander Holbreich, Simon Zambr...
IDTRUST
2010
ACM
14 years 10 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
JUCS
2010
89views more  JUCS 2010»
14 years 10 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
ASWEC
2006
IEEE
15 years 5 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han