Sciweavers

238 search results - page 1 / 48
» Security Control for COTS Components
Sort
View
COMPUTER
1998
75views more  COMPUTER 1998»
13 years 4 months ago
Security Control for COTS Components
Qun Zhong, Nigel Edwards
DSN
2007
IEEE
13 years 11 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 6 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
RTSS
2008
IEEE
13 years 11 months ago
Hardware Runtime Monitoring for Dependable COTS-Based Real-Time Embedded Systems
COTS peripherals are heavily used in the embedded market, but their unpredictability is a threat for high-criticality real-time systems: it is hard or impossible to formally verif...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Marco...
RTSS
2009
IEEE
13 years 11 months ago
Real-Time Control of I/O COTS Peripherals for Embedded Systems
Real-time embedded systems are increasingly being built using commercial-off-the-shelf (COTS) components such as mass-produced peripherals and buses to reduce costs, timeto-market...
Stanley Bak, Emiliano Betti, Rodolfo Pellizzoni, M...