Sciweavers

2517 search results - page 89 / 504
» Secure Deployment of Components
Sort
View
SWS
2006
ACM
15 years 9 months ago
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses
In this paper we propose a security architecture for Virtual Organizations for businesses. The Virtual Organizations we consider are based on web service technology to address int...
Rafael Deitos, Florian Kerschbaum, Philip Robinson
ESORICS
2005
Springer
15 years 9 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
NBIS
2009
Springer
15 years 8 months ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
124
Voted
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 10 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
SAFECOMP
1998
Springer
15 years 7 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel