Sciweavers

3516 search results - page 189 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
139
Voted
IAJIT
2010
133views more  IAJIT 2010»
15 years 2 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
122
Voted
CODES
2007
IEEE
15 years 9 months ago
A data protection unit for NoC-based architectures
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
DIAU
2000
Springer
15 years 7 months ago
Towards an Analysis of Onion Routing Security
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...
RTCSA
2005
IEEE
15 years 9 months ago
Model Checking Timed Systems with Priorities
Priorities are used to resolve conflicts such as in resource sharing and in safety designs. The use of priorities has become indispensable in real-time system design such as in s...
Pao-Ann Hsiung, Shang-Wei Lin
144
Voted
EUROMICRO
1999
IEEE
15 years 7 months ago
Design Space Exploration in System Level Synthesis under Memory Constraints
This paper addresses the problem of component selection, task assignment and task scheduling for distributed embedded computer systems. Such systems have a large number of constra...
Radoslaw Szymanek, Krzysztof Kuchcinski