Sciweavers

18094 search results - page 171 / 3619
» The Architecture of Secure Systems
Sort
View
ISI
2007
Springer
14 years 11 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
14 years 10 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic
CC
2003
Springer
102views System Software» more  CC 2003»
15 years 5 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
COMCOM
2002
189views more  COMCOM 2002»
14 years 11 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
PERCOM
2004
ACM
15 years 11 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark