Sciweavers

8503 search results - page 311 / 1701
» Secure Software Architectures
Sort
View
CSMR
2008
IEEE
15 years 11 months ago
Towards Recovering Architectural Concepts Using Latent Semantic Indexing
Software engineers think about an existing software system in terms of high-level models. The high-level models are translated to source code and the concepts represented in these...
Pieter van der Spek, Steven Klusener, Piërre ...
95
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Architecture and Concepts of the ARGuE Guard
ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation. ARGuE is based on Network Associates' Gauntlet firewa...
Jeremy Epstein
IEEEIAS
2009
IEEE
15 years 11 months ago
Action-Based Access Control for Web Services
: Web services over the Internet are widely used nowadays. The problem of secure access to Web-based systems is of great importance naturally. Compared with the existing models, th...
FengHua Li, Wei Wang, Jianfeng Ma, Haoxin Su
CORR
2008
Springer
187views Education» more  CORR 2008»
15 years 5 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
138
Voted
JHSN
2006
95views more  JHSN 2006»
15 years 5 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...