Sciweavers

11603 search results - page 73 / 2321
» Embedded System Security
Sort
View
PDPTA
2008
15 years 6 months ago
Intrusion-Tolerant Dissemination in Large-Scale Systems
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
Kim Potter Kihlstrom, Robin Elliott, Kelsey Marshm...
FTDCS
1997
IEEE
15 years 8 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
15 years 11 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
126
Voted
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 11 months ago
A Novel Concept: Message Driven Frequency Hopping (MDFH)
—Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems,...
Qi Ling, Tongtong Li, Zhi Ding
IESS
2007
Springer
138views Hardware» more  IESS 2007»
15 years 10 months ago
Medical Embedded Systems
Roozbeh Jafari, Soheil Ghiasi, Majid Sarrafzadeh