Sciweavers

18094 search results - page 153 / 3619
» The Architecture of Secure Systems
Sort
View
ICSE
1999
IEEE-ACM
15 years 4 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
CCS
2004
ACM
15 years 5 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
JSW
2007
102views more  JSW 2007»
14 years 11 months ago
A Novel Framework for Building Distributed Data Acquisition and Monitoring Systems
— We propose a novel framework for building a distributed data acquisition and monitoring system. Our novel framework is mainly based on XML leverages and OPC (Openness, Producti...
Vu Van Tan, Dae-Seung Yoo, Myeong-Jae Yi
WS
2004
ACM
15 years 5 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 12 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan