Sciweavers

1737 search results - page 26 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
114
Voted
ASPLOS
2008
ACM
15 years 5 months ago
Parallelizing security checks on commodity hardware
Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows se...
Edmund B. Nightingale, Daniel Peek, Peter M. Chen,...
121
Voted
CCS
2009
ACM
15 years 10 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
123
Voted
WORDS
2005
IEEE
15 years 9 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
120
Voted
ICCSA
2009
Springer
15 years 1 months ago
Towards Guidelines for a Development Process for Component-Based Embedded Systems
Software is more and more built from pre-existing components. This is true also for the embedded software domain, and there is a need to consider how development processes need to ...
Rikard Land, Jan Carlson, Stig Larsson, Ivica Crnk...
115
Voted
DATE
2003
IEEE
109views Hardware» more  DATE 2003»
15 years 8 months ago
Data Space Oriented Scheduling in Embedded Systems
With the widespread use of embedded devices such as PDAs, printers, game machines, cellular telephones, achieving high performance demands an optimized operating system (OS) that ...
Mahmut T. Kandemir, Guangyu Chen, Wei Zhang 0002, ...