Sciweavers

2281 search results - page 288 / 457
» Security Patterns and Secure Systems Design
Sort
View
104
Voted
AGENTS
2000
Springer
15 years 8 months ago
Towards a fault-tolerant multi-agent system architecture
Multi-agent systems are prone to failures typical of any distributed system. Agents and resources may become unavailable due to machine crashes, communication breakdowns, process ...
Sanjeev Kumar, Philip R. Cohen
151
Voted
SACMAT
2006
ACM
15 years 9 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
ICCD
2002
IEEE
257views Hardware» more  ICCD 2002»
16 years 23 days ago
Requirements for Automotive System Engineering Tools
The requirements to system and software development tools brought up by the automotive industry differ from the requirements that other customers have. The important catchwords he...
Joachim Schlosser
184
Voted
AOSD
2005
ACM
15 years 9 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
129
Voted
SAC
2010
ACM
15 years 10 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...