Sciweavers

4330 search results - page 102 / 866
» Analyzing security architectures
Sort
View
130
Voted
USENIX
2001
15 years 6 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
TVLSI
2008
144views more  TVLSI 2008»
15 years 4 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...
KBSE
2005
IEEE
15 years 10 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
137
Voted
JSW
2007
151views more  JSW 2007»
15 years 4 months ago
Architecture Potential Analysis: A Closer Look inside Architecture Evaluation
— The share of software in embedded systems has been growing permanently in the recent years. Thus, software architecture as well as its evaluation have become important parts of...
Bastian Florentz, Michaela Huhn
145
Voted
ISI
2004
Springer
15 years 10 months ago
The Architecture of the Cornell Knowledge Broker
Intelligence applications have to process massive amounts of data in order to extract relevant information. This includes archived historical data as well as continuously arriving ...
Alan J. Demers, Johannes Gehrke, Mirek Riedewald