Sciweavers

8503 search results - page 290 / 1701
» Secure Software Architectures
Sort
View
ICSE
2007
IEEE-ACM
15 years 11 months ago
Architecture Knowledge Management: Challenges, Approaches, and Tools
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software develo...
Muhammad Ali Babar, Ian Gorton
ECSA
2011
Springer
14 years 4 months ago
Delta-oriented architectural variability using MontiCore
Modeling of software architectures is a fundamental part of software development processes. Reuse of software components and early analysis of software topologies allow the reduct...
Arne Haber, Thomas Kutz, Holger Rendel, Bernhard R...
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 5 months ago
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Mikaël Ates, Christophe Gravier, Jér&e...
DAC
2005
ACM
16 years 5 months ago
High performance encryption cores for 3G networks
This paper presents two novel and high performance hardware architectures, implemented in FPGA technology, for the KASUMI block cipher; this algorithm lies at the core of the conf...
René Cumplido, Tomás Balderas-Contre...
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
15 years 11 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang