Sciweavers

4330 search results - page 70 / 866
» Analyzing security architectures
Sort
View
97
Voted
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 4 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
MOBICOM
2010
ACM
14 years 10 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
15 years 4 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
79
Voted
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
14 years 8 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic
SWS
2004
ACM
15 years 3 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley