Sciweavers

107 search results - page 4 / 22
» A Reputation-Based Approach for Securing Vivaldi Embedding S...
Sort
View
SIGOPS
2008
152views more  SIGOPS 2008»
13 years 5 months ago
The Caernarvon secure embedded operating system
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has b...
David C. Toll, Paul A. Karger, Elaine R. Palmer, S...
EIT
2008
IEEE
14 years 14 days ago
Architectural support for securing application data in embedded systems
—The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the sy...
Olga Gelbart, Eugen Leontie, Bhagirath Narahari, R...
ECOOP
2003
Springer
13 years 11 months ago
Open APIs for Embedded Security
Abstract. Embedded computer control is increasingly common in appliances, vehicles, communication devices, medical instruments, and many other systems. Some embedded computer syste...
Carl A. Gunter
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
13 years 8 months ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
CISIS
2009
IEEE
14 years 24 days ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando