Sciweavers

8503 search results - page 292 / 1701
» Secure Software Architectures
Sort
View
128
Voted
NCA
2005
IEEE
15 years 10 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
TRUSTBUS
2005
Springer
15 years 10 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
WICSA
2008
15 years 6 months ago
"The 3+1 Views of Architecture (in 3D)": An Amplification of the 4+1 Viewpoint Framework
Processes and techniques for the development of enterprise software are best served when infused with practical experience. Pragmatic reflection on what works and what doesn'...
Mark Kennaley
155
Voted
WICSA
2001
15 years 6 months ago
Interface-Centric Architecture Descriptions
This paper presents an approach to defining component-based software architectures in which interfaces rather than components play the key role. Architectural descriptions are bui...
Hans Jonkers
SIGSOFT
2010
ACM
15 years 2 months ago
Software engineering issues for mobile application development
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...
Anthony I. Wasserman