Sciweavers

8503 search results - page 320 / 1701
» Secure Software Architectures
Sort
View
KBSE
2005
IEEE
15 years 10 months ago
Bamboo: an architecture modeling and code generation framework for configuration management systems
We describe an architecture modeling and code generation framework called Bamboo. Using Bamboo, engineers design SCM repository and feature models, and then generate a running SCM...
Guozheng Ge, E. James Whitehead Jr.
117
Voted
P2P
2002
IEEE
15 years 10 months ago
Dependability Properties of P2P Architectures
There is an increasing interest in using P2P as a basis for software systems. However, by their very nature, achieving dependability within a P2P system can be difficult. This pap...
James Walkerdine, Lee Melville, Ian Sommerville
IADIS
2003
15 years 6 months ago
A New Key Distribution Scheme for Secure Multicast Communications
In this short paper, we propose a new key management architecture for Multicast communications. This architecture combines the complementary variable approach with hashed keys and...
Martin St-Amand, Boucif Amar Bansaber, Dominique S...
ASWEC
2006
IEEE
15 years 11 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
RE
2005
Springer
15 years 10 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...