Sciweavers

147 search results - page 19 / 30
» Towards a Component based Privacy Protector Architecture
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
15 years 3 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
78
Voted
SERP
2004
14 years 10 months ago
Using ZOOM Approach to Support MDD
Model-Driven Development (MDD) represents a positive step toward a general model-based approach to software engineering. The Object Management Group (OMG) offers a conceptual fram...
Xiaoping Jia, Adam Steele, Hongming Liu, Lizhang Q...
CCS
2009
ACM
15 years 1 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
ICEIS
2000
IEEE
15 years 1 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant