Sciweavers

8503 search results - page 308 / 1701
» Secure Software Architectures
Sort
View
TRUSTBUS
2007
Springer
15 years 11 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
AGENTS
2000
Springer
15 years 9 months ago
An Architecture for Modeling Internet-Based Collaborative Agent Systems
Abstract. This paper describes an architecture for modeling cooperating systems of communicating agents. The authors’ goal is not that of providing a framework to implement multi...
Roberto A. Flores, Robert C. Kremer, Douglas H. No...
129
Voted
TRUSTBUS
2010
Springer
15 years 3 months ago
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression
We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging so...
Javier Parra-Arnau, David Rebollo-Monedero, Jordi ...
DATE
2010
IEEE
125views Hardware» more  DATE 2010»
15 years 10 months ago
pSHS: A scalable parallel software implementation of Montgomery multiplication for multicore systems
—Parallel programming techniques have become one of the great challenges in the transition from single-core to multicore architectures. In this paper, we investigate the parallel...
Zhimin Chen, Patrick Schaumont
CSMR
2008
IEEE
15 years 11 months ago
Using Architectural Models to Predict the Maintainability of Enterprise Systems
Modern software systems are highly interconnected and have been under constant change for many years. IT decision makers find it difficult to predict and plan change projects due ...
Robert Lagerström, Pontus Johnson