Sciweavers

2236 search results - page 116 / 448
» Secure Software Design in Practice
Sort
View
AICCSA
2005
IEEE
87views Hardware» more  AICCSA 2005»
15 years 10 months ago
A XML format secure protocol - OpenSST
OpenSST (Open Simple Secure Transaction) is a free software project and aims to create an efficient, open and secure alternative to the secure proprietary transaction protocol. Op...
Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christo...
OOPSLA
2005
Springer
15 years 10 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 11 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
QOSA
2009
Springer
15 years 9 months ago
Automated Architecture Consistency Checking for Model Driven Software Development
When software projects evolve their actual implementation and their intended architecture may drift apart resulting in problems for further maintenance. As a countermeasure it is g...
Matthias Biehl, Welf Löwe
IEICET
2008
113views more  IEICET 2008»
15 years 4 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...