Sciweavers

8503 search results - page 284 / 1701
» Secure Software Architectures
Sort
View
WCRE
2007
IEEE
15 years 11 months ago
Dynamic Analysis Techniques for the Reconstruction of Architectural Views
Gaining an understanding of software systems is an important discipline in many software engineering contexts. It is essential that software engineers are assisted as much as poss...
Bas Cornelissen
132
Voted
QOSA
2010
Springer
15 years 8 months ago
Good Architecture = Good (ADL + Practices)
In order to ensure the quality of their software development process, companies incorporate best practices from recognized repositories or from their own experiences. These best pr...
Vincent Le Gloahec, Régis Fleurquin, Salah ...
STORAGESS
2006
ACM
15 years 10 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
MOBISYS
2008
ACM
16 years 4 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
GI
2004
Springer
15 years 10 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner