Sciweavers

18094 search results - page 134 / 3619
» The Architecture of Secure Systems
Sort
View
COMPSAC
2005
IEEE
15 years 5 months ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
OOPSLA
2004
Springer
15 years 5 months ago
Second generation web services-oriented architecture in production in the finance industry
Effective and affordable business process integration is a key concern in the finance industry. A large German joint-use centre, supplying services to 237 individual savings banks...
Olaf Zimmermann, Sven Milinski, Michael Craes, Fra...
OOPSLA
2009
Springer
15 years 4 months ago
Agile anthropology and Alexander's architecture: an essay in three voices
During its formative decades the software community looked twice to the theories of ChristopherAlexander for inspiration, both times failing to completely master the architect’s...
Jenny Quillien, Pam Rostal, Dave West
CLEIEJ
2006
147views more  CLEIEJ 2006»
14 years 11 months ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters