Security benefits from software architecture
- 1 January 1997
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Modeling the "Multipolicy Machine"Published by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Aster: a framework for sound customization of distributed runtime systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A constructive development environment for parallel and distributed programsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Formalizing architectural connectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Integrating security in CORBA based object architecturesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- MiddlewareCommunications of the ACM, 1996
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- Coordination languages and their significanceCommunications of the ACM, 1992
- Formal Models for Computer SecurityACM Computing Surveys, 1981
- Programming-in-the-Large Versus Programming-in-the-SmallIEEE Transactions on Software Engineering, 1976