Sciweavers

2517 search results - page 73 / 504
» Secure Deployment of Components
Sort
View
128
Voted
ADAEUROPE
2007
Springer
15 years 9 months ago
Enhancing Dependability of Component-Based Systems
Abstract. We present an approach for enhancing dependability of component-based software. Functionality related to security, safety and reliability is encapsulated in specific com...
Arnaud Lanoix, Denis Hatebur, Maritta Heisel, Jean...
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 8 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
MIDDLEWARE
2004
Springer
15 years 8 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
140
Voted
OOPSLA
1999
Springer
15 years 7 months ago
The Generic Graph Component Library
In this paper we present the Generic Graph Component Library (GGCL), a generic programming framework for graph data structures and graph algorithms. Following the theme of the Sta...
Lie-Quan Lee, Jeremy G. Siek, Andrew Lumsdaine