Systematic literature review of security pattern research
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
Engineering security into distributed systems: A survey of methodologies
A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …
software distribution as a central computing paradigm. This has been accompanied by a …
ASE: A comprehensive pattern-driven security methodology for distributed systems
AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …
designing distributed systems. Over the last decade, researchers and practitioners have …
Achieving sender anonymity in tor against the global passive adversary
Tor is the de facto standard used for anonymous communication over the Internet. Despite
its wide usage, Tor does not guarantee sender anonymity, even in a threat model in which …
its wide usage, Tor does not guarantee sender anonymity, even in a threat model in which …
Vitool-BC: Visualization tool based on Cooja simulator for WSN
Evaluation and monitoring of wireless sensor networks (WSN) and the parameters defining
their operations and design, such as energy consumption, latency, and stability, is a …
their operations and design, such as energy consumption, latency, and stability, is a …
Critical dimensions of blockchain technology implementation in the healthcare industry: An integrated systems management approach
In the digital era, almost every system is connected to a digital platform to enhance
efficiency. Although life is thus improved, security issues remain important, especially in the …
efficiency. Although life is thus improved, security issues remain important, especially in the …
Privacy preserving data aggregation for smart grid with user anonymity and designated recipients
L Wu, W Zhang, W Zhao - Symmetry, 2022 - mdpi.com
Smart grids integrate modern Internet of Things technologies with the traditional grid
systems, aiming to achieve effective and reliable electricity distribution as well as promote …
systems, aiming to achieve effective and reliable electricity distribution as well as promote …
Expediting the design and development of secure cloud-based mobile apps
FT Chimuco, JBF Sequeiros, TMC Simōes… - International Journal of …, 2024 - Springer
The adoption and popularity of mobile devices by end-users is partially driven by the
increasing development and availability of mobile applications that can aid solving different …
increasing development and availability of mobile applications that can aid solving different …
Reversible Image Fragile Watermarking with Dual Tampering Detection
The verification of image integrity has attracted increasing attention. Irreversible algorithms
embed fragile watermarks into cover images to verify their integrity, but they are not …
embed fragile watermarks into cover images to verify their integrity, but they are not …
Dynamic security properties monitoring architecture for cloud computing
In this chapter, the authors provide an overview of the importance of the monitoring of
security properties in cloud computing scenarios. They then present an approach based on …
security properties in cloud computing scenarios. They then present an approach based on …