Abstract | ||
---|---|---|
This paper addresses the need for strong security guarantees in increasingly dynamic and flexible information technology (IT) environments. It applies time-tested security principles, architectural patterns, and continuous improvement constructs to weave ... |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/WETICE.2005.37 | WETICE |
Keywords | Field | DocType |
peer-to-peer computing,software engineering,Eclipse environment,P2P network,awareness distribution mechanism,distributed software engineering,informal communication,peer-to-peer networking,semantic overlay network organization algorithm,simulation approach | Software Engineering Process Group,Software design,Software engineering,Computer science,Software system,Component-based software engineering,Software construction,Software development,Overlay network,Social software engineering,Distributed computing | Conference |
ISBN | Citations | PageRank |
0-7695-2362-5 | 1 | 0.37 |
References | Authors | |
10 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
David Nutter | 1 | 71 | 5.32 |
Cornelia Boldyreff | 2 | 464 | 56.05 |