Sciweavers

8503 search results - page 317 / 1701
» Secure Software Architectures
Sort
View
151
Voted
ICSM
1997
IEEE
15 years 9 months ago
MORALE. Mission ORiented Architectural Legacy Evolution
Software evolution is the most costly and time consuming software development activity. Yet software engineering research is predominantly concerned with initial development. MORA...
Gregory D. Abowd, Ashok K. Goel, Dean F. Jerding, ...
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
14 years 8 months ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 12 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
AOSD
2009
ACM
15 years 12 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
131
Voted
TAPSOFT
1997
Springer
15 years 9 months ago
Using LOTOS Patterns to Characterize Architectural Styles
We show how the formal description language LOTOS can be used to de ne software architectures and how patterns over LOTOS can serve to characterize architectural styles. We charact...
Maritta Heisel, Nicole Lévy