Sciweavers

4330 search results - page 78 / 866
» Analyzing security architectures
Sort
View
MICRO
2008
IEEE
159views Hardware» more  MICRO 2008»
15 years 4 months ago
A novel cache architecture with enhanced performance and security
—Caches ideally should have low miss rates and short access times, and should be power efficient at the same time. Such design goals are often contradictory in practice. Recent f...
Zhenghong Wang, Ruby B. Lee
WETICE
2008
IEEE
15 years 4 months ago
An Architecture for an Adaptive and Collaborative Learning Management System in Aviation Security
The importance of aviation security has increased dramatically in recent years. Frequently changing regulations and the need to adapt quickly to new and emerging threats are chall...
Yi Guo, Adrian Schwaninger, Harald Gall
97
Voted
WICSA
2001
14 years 11 months ago
MAP - Mining Architectures for Product Line Evaluations
Product lines evolve out of existing products. In order to evaluate the potential of creating a product line from existing products it is necessary to `mine' their architectu...
Christoph Stoermer, Liam O'Brien
82
Voted
NSPW
2004
ACM
15 years 3 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
ACSAC
2004
IEEE
15 years 1 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh