Sciweavers

18094 search results - page 43 / 3619
» The Architecture of Secure Systems
Sort
View
JHSN
2006
96views more  JHSN 2006»
14 years 11 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
EWSA
2006
Springer
15 years 2 months ago
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Holger Schmidt, Ina Wentzlaff
AVBPA
2005
Springer
282views Biometrics» more  AVBPA 2005»
15 years 4 months ago
Secure Fingerprint Matching with External Registration
Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) system...
James Reisman, Umut Uludag, Arun Ross
CSFW
1999
IEEE
15 years 3 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 3 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...