NoSQL databases are easy to scale-out because of their flexible schema and support for BASE (Basically Available, Soft State and Eventually Consistent) properties. The process of …
Driven by expanding scientific computing and business enterprise needs, the last decade has seen a shift toward software paradigms in which distribution plays a central role. The …
R Mzid, S Selvi, M Abid - SN Computer Science, 2024 - Springer
Software system development is a difficult, error-prone, and time-consuming task. Pattern- based development has been successfully used to produce high-quality software to address …
K Nahar, AQ Gill - Data & Knowledge Engineering, 2022 - Elsevier
Identity and access management (IAM) is one of the key components of the secure enterprise architecture for protecting the digital assets of the information systems. The …
M Bunke, R Koschke, K Sohr - International Journal on Advances in …, 2012 - iariajournals.org
Software security is an emerging area in software development. More and more vulnerabilities are published and highlight the endangerment of systems. Hence, software …
AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2015 - Elsevier
The design of an authorization infrastructure is one of the most important aspects of engineering a secure software system. Unlike other system types, distributed systems–and …
EB Fernandez, O Ajaj, I Buckley, N Delessy-Gassant… - Future Internet, 2012 - mdpi.com
An important aspect for the acceptance of Service-Oriented Architectures is having convenient ways to help designers build secure applications. Numerous standards define …
EB Fernandez - Security and dependability for ambient intelligence, 2009 - Springer
Patterns encapsulate experience and good practices that can be used for new designs. Analysis and design patterns are well established as a convenient and reusable way to …
Bhawna, V Parihar - Meta Heuristic Algorithms for Advanced …, 2024 - Wiley Online Library
The widespread use of distributed systems has led to a growing concern over their security. With the increasing number of devices connected to the Internet, the risk of security …