Sciweavers

2337 search results - page 88 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
APSEC
2003
IEEE
15 years 3 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
ACIVS
2005
Springer
15 years 3 months ago
Designing Area and Performance Constrained SIMD/VLIW Image Processing Architectures
Abstract. Image processing is widely used in many applications, including medical imaging, industrial manufacturing and security systems. In these applications, the size of the ima...
Hamed Fatemi, Henk Corporaal, Twan Basten, Richard...
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
15 years 3 months ago
IRTL (Information Resource Transaction Layer) Middleware Design for P2P and Open GRID Services
In this paper we present an IRTL (Information Resource Transaction Layer) middleware architecture that addresses some of the important technical challenges associated with heterog...
Junseok Hwang, Praveen Aravamudham, Elizabeth D. L...
CAISE
2000
Springer
15 years 2 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
WOSP
2010
ACM
15 years 2 months ago
A framework for utility-based service oriented design in SASSY
The architecture of a software system has a significant impact on its quality of service (QoS) as measured by several performance metrics such as execution time, availability, th...
Daniel A. Menascé, John M. Ewing, Hassan Go...