Sciweavers

946 search results - page 56 / 190
» Software engineering for security: a roadmap
Sort
View
MIDDLEWARE
2004
Springer
15 years 3 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
SEKE
2004
Springer
15 years 3 months ago
Applying Aspect-Orientation in Designing Security Systems: A Case Study
As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is necessary to come up with an approach to guide the ...
Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin...
EUROMICRO
2009
IEEE
15 years 1 months ago
Multi-layered Virtual Machines for Security Updates in Grid Environments
The use of user specific virtual machines (VMs) in Grid and Cloud computing reduces the administration overhead associated with manually installing required software for every user...
Roland Schwarzkopf, Matthias Schmidt, Niels Fallen...
CCS
2006
ACM
15 years 1 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
RE
2007
Springer
15 years 3 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...