Sciweavers

933 search results - page 45 / 187
» Secure Software Architectures Design by Aspect Orientation
Sort
View
WORDS
2003
IEEE
15 years 5 months ago
Middleware Support for Embedded Software with Multiple QoS Properties for Ubiquitous Computing Environments
Ubiquitous application software usually has multiple QoS requirements, such as situationawareness, real-time, and security, which make the application software development complic...
Stephen S. Yau, Yu Wang, Dazhi Huang
LADC
2007
Springer
15 years 6 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 5 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
AGENTS
2001
Springer
15 years 4 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
ICSM
1997
IEEE
15 years 4 months ago
MORALE. Mission ORiented Architectural Legacy Evolution
Software evolution is the most costly and time consuming software development activity. Yet software engineering research is predominantly concerned with initial development. MORA...
Gregory D. Abowd, Ashok K. Goel, Dean F. Jerding, ...