Sciweavers

8503 search results - page 309 / 1701
» Secure Software Architectures
Sort
View
127
Voted
AUIC
2003
IEEE
15 years 10 months ago
User Interface Requirements for Authentication of Communication
Authentication is a security service that consists of verifying that someone’s identity is as claimed. There are a number of challenges to presenting information from the authen...
Audun Jøsang, Mary Anne Patton
COMCOM
2000
105views more  COMCOM 2000»
15 years 4 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
ESORICS
2010
Springer
15 years 6 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
EICS
2009
ACM
15 years 11 months ago
A responsibility-based pattern language for usability-supporting architectural patterns
Usability-supporting architectural patterns (USAPs) were developed as a way to explicitly connect the needs of architecturally-sensitive usability concerns to the design of softwa...
Bonnie E. John, Len Bass, Elspeth Golden, Pia Stol...
ICSE
1998
IEEE-ACM
15 years 9 months ago
Integrating Architecture Description Languages with a Standard Design Method
Software architecture descriptions are high-level models of software systems. Some researchers have proposed specialpurpose architectural notations that have a great deal of expre...
Jason E. Robbins, Nenad Medvidovic, David F. Redmi...