Sciweavers

2056 search results - page 168 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
15 years 8 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
FECS
2006
101views Education» more  FECS 2006»
15 years 5 months ago
Providing Application Services for Small Businesses
- Many small businesses require distributed information systems but do not have the resources to develop, host or maintain them. An alternative approach may be to offer the softwar...
Carol Lushbough
LCTRTS
2009
Springer
15 years 11 months ago
Software transactional memory for multicore embedded systems
Embedded systems, like general-purpose systems, can benefit from parallel execution on a symmetric multicore platform. Unfortunately, concurrency issues present in general-purpos...
Jennifer Mankin, David R. Kaeli, John Ardini
SIGSOFT
2007
ACM
16 years 5 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
SIGSOFT
2003
ACM
15 years 9 months ago
Modeling and validation of service-oriented architectures: application vs. style
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...