Buscar
Mostrando ítems 1-9 de 9
Ponencia
How to develop secure applications with Aspect-Oriented Programming
(IEEE Computer Society, 2013)
In the last few years several new programming techniques for achieving a better separation of concerns have been defined. One of the most accepted has been Aspect-Oriented Programming (AOP). Those attending this tutorial ...
Artículo
An approach for deploying and monitoring dynamic security policies
(Elsevier, 2016)
Security policies are enforced through the deployment of certain security functionalities within the applications. When the security policies dynamically change, the associated security functionalities currently deployed ...
Ponencia
Injecting Quality Attributes into Software Architectures with the Common Variability Language
(ACM Digital Library, 2014)
Quality attributes that add new behavior to the functional software architecture are known as functional quality attributes (FQAs). These FQAs are applied to pieces of software from small components to entire systems, ...
Artículo
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
(MDPI, 2015)
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications ...
Ponencia
Runtime Enforcement of Dynamic Security Policies
(Springer, 2014)
The security policies of an application can change at runtime due to several reasons, as for example the changes on the user preferences, the lack of enough resources in mobile environments or the negotiation of security ...
Ponencia
An Aspect-Oriented Model Transformation to Weave Security using CVL
(IEEE Computer Society, 2014)
In this paper, we combine the Common Variability Language (CVL) and the ATL Transformation Language to customize and incorporate a generic security model into any application that requires security. Security spans a large ...
Ponencia
Dynamic Deployment and Monitoring of Security Policies
(Springer, 2015)
INTER-TRUST is a framework for the specification, negotiation, deployment and dynamic adaptation of interoperable security policies, in the context of pervasive systems where devices are constantly exchanging critical ...
Ponencia
Closing the Gap between the Specification and Enforcement of Security Policies
(Springer, 2014)
Security policies are enforced through the deployment of certain security functionalities within the applications. Applications can have different levels of security and thus each security policy is enforced by different ...
Ponencia
Variability and Dependency Modeling of Quality Attributes
(IEEE Computer Society, 2013)
Functional Quality Attributes (FQAs) are quality attributes that have strong functional implications and so can be easily modeled by software components. Thus, we use an aspect-oriented software product line approach, ...