Sciweavers

1737 search results - page 107 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
CLUSTER
2002
IEEE
15 years 9 months ago
A New Architecture for Secure Carrier-Class Clusters
Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective ha...
Makan Pourzandi, Ibrahim Haddad, Charles Levert, M...
132
Voted
CCS
2007
ACM
15 years 10 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
ACSAC
1998
IEEE
15 years 8 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
MICRO
2009
IEEE
113views Hardware» more  MICRO 2009»
15 years 10 months ago
Portable compiler optimisation across embedded programs and microarchitectures using machine learning
Building an optimising compiler is a difficult and time consuming task which must be repeated for each generation of a microprocessor. As the underlying microarchitecture changes...
Christophe Dubach, Timothy M. Jones, Edwin V. Boni...
BTW
2009
Springer
168views Database» more  BTW 2009»
15 years 7 months ago
Embedded Analytics in Front Office Applications
: Today, decision making by users of front office applications happens without analytical information supporting this process. We propose as solution Embedded Analytics (EA) making...
Martin Oberhofer, Erik Nijkamp