Sciweavers

2517 search results - page 66 / 504
» Secure Deployment of Components
Sort
View
CD
2004
Springer
15 years 8 months ago
Customizing Component-Based Architectures by Contract
This paper presents an approach to describe, deploy and manage component-based applications having dynamic functional and non-functional requirements. The approach is centered on a...
Orlando Loques, Alexandre Sztajnberg
ICSE
2004
IEEE-ACM
16 years 3 months ago
Component-Based Self-Adaptability in Peer-to-Peer Architectures
Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of sophisticated...
Sascha Alda
MSWIM
2005
ACM
15 years 8 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
ISSTA
2010
ACM
15 years 7 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
CCS
2007
ACM
15 years 9 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...