Sciweavers

2429 search results - page 211 / 486
» Using Aspects to Design a Secure System
Sort
View
130
Voted
WICSA
2004
15 years 4 months ago
An Externalized Infrastructure for Self-Healing Systems
Software architecture descriptions can play a wide variety of roles in the software lifecycle, from requirements specification, to logical design, to implementation architectures....
David S. Wile, Alexander Egyed
130
Voted
IFIPTM
2009
149views Management» more  IFIPTM 2009»
15 years 1 months ago
An Experimental Testbed for Evaluation of Trust and Reputation Systems
Abstract. To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy...
Reid Kerr, Robin Cohen
136
Voted
FGCS
2007
90views more  FGCS 2007»
15 years 3 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
ASE
2008
120views more  ASE 2008»
15 years 3 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
ICCD
2003
IEEE
123views Hardware» more  ICCD 2003»
16 years 12 days ago
Simplifying SoC design with the Customizable Control Processor Platform
With the circuit density available in today’s ASIC design systems, increased integration is possible creating more complexity in the design of a System on a Chip (SoC). IBM’s ...
C. Ross Ogilvie, Richard Ray, Robert Devins, Mark ...