메뉴 건너뛰기




Volumn 1282, Issue , 1997, Pages 64-80

Security benefits from software architecture

Author keywords

[No Author keywords available]

Indexed keywords

MIDDLEWARE; NETWORK SECURITY; QUALITY OF SERVICE; SOFTWARE ARCHITECTURE;

EID: 38049147663     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-63383-9_73     Document Type: Conference Paper
Times cited : (13)

References (32)
  • 4
    • 0030083693 scopus 로고    scopus 로고
    • Middleware: A Model for Distributed System Services
    • February
    • P.A. Bernstein. Middleware: a Model for Distributed System Services. Communication of the ACM, 39(2), February 1996.
    • (1996) Communication of the ACM , vol.39 , Issue.2
    • Bernstein, P.A.1
  • 9
    • 0003969633 scopus 로고
    • Technical Report DoD 5200.28-STD, December
    • Department of Defense Standard. Trusted computer system evaluation criteria. Technical Report DoD 5200.28-STD, December 1985.
    • (1985) Trusted Computer System Evaluation Criteria
  • 10
    • 0016963069 scopus 로고
    • Programming-in-the-Large versus Programming-in-the-Small
    • F. DeRemer and H. Kron. Programming-in-the-Large versus Programming-in-the-Small. IEEE Transactions on Software Engineering, 2(2):80-86, June 1976.
    • (1976) IEEE Transactions on Software Engineering , vol.2 , Issue.2 , pp. 80-86
    • Deremer, F.1    Kron, H.2
  • 12
    • 84976215953 scopus 로고
    • Coordination languages and their significance
    • D. Gelernter and N. Carriero. Coordination languages and their significance. Communications of the ACM, 35(2):97-107, 1992.
    • (1992) Communications of the ACM , vol.35 , Issue.2 , pp. 97-107
    • Gelernter, D.1    Carriero, N.2
  • 17
    • 0026242187 scopus 로고
    • Security in open networks and distributed systems
    • P. Janson and R. Molva. Security in open networks and distributed systems. Computer Networks and ISDN Systems, (22):323-346, 1991.
    • (1991) Computer Networks and ISDN Systems , vol.22 , pp. 323-346
    • Janson, P.1    Molva, R.2
  • 19
    • 0019608720 scopus 로고
    • Formal models for computer security
    • C. E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247-278, November 1981.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 22
    • 84957073062 scopus 로고
    • Technical Report NCSC-TG-005, July
    • National Computer Security Center. Trusted network interpretation of the tcsec. Technical Report NCSC-TG-005, July 1987.
    • (1987) Trusted Network Interpretation of the Tcsec
  • 24
    • 0006736457 scopus 로고
    • TC Document 94.4.16, OMG, April, Available by ftp at ftp.omg.org:/pub/docs
    • OMG Security Working Group. White Paper on Security. TC Document 94.4.16, OMG, April 1994. Available by ftp at ftp.omg.org:/pub/docs.
    • (1994) White Paper on Security
  • 25


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.