Sciweavers

3544 search results - page 43 / 709
» Information Security in Open Systems
Sort
View
ICEIS
2003
IEEE
15 years 4 months ago
Analysing Security Requirements of Information Systems Using Tropos
Haralambos Mouratidis, Gordon A. Manson, Abdullah ...
118
Voted
SIGOPSE
1994
ACM
15 years 2 months ago
New Directions for Integrated Circuit Cards Operating Systems
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Pierre Paradinas, Jean-Jacques Vandewalle
98
Voted
COMCOM
2007
100views more  COMCOM 2007»
14 years 11 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 2 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ADHOC
2007
130views more  ADHOC 2007»
14 years 11 months ago
Implementation of security policy for clinical information systems over wireless sensor networks
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...
Jelena V. Misic, Vojislav B. Misic