Sciweavers

20 search results - page 1 / 4
» Recent Development in Information Technology Security Evalua...
Sort
View
SEC
2007
13 years 6 months ago
Ontological Mapping of Common Criteria's Security Assurance Requirements
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
DAC
2010
ACM
13 years 8 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
SAFECOMP
2007
Springer
13 years 11 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
AGENTS
2001
Springer
13 years 9 months ago
Evaluation of modeling techniques for agent-based systems
To develop agent-based systems, one needs a methodology that supports the development process as common in other disciplines. In recent years, several such methodologies and model...
Onn Shehory, Arnon Sturm