Sciweavers

3516 search results - page 214 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
145
Voted
ASP
2003
Springer
15 years 8 months ago
Mappings Between Domain Models in Answer Set Programming
Integration of data is required when accessing multiple databases within an organization or on the WWW. Schema integration is required for database interoperability, but it is curr...
Stefania Costantini, Andrea Formisano, Eugenio G. ...
114
Voted
FPLAY
2008
15 years 5 months ago
Crafting game-models using reactive system design
This paper presents a game-model of a gym training system, where the behavior of the system is specified using languages developed originally for reactive system design, which dri...
David Harel, Itai Segall, Hillel Kugler, Yaki Sett...
CCS
2005
ACM
15 years 9 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
182
Voted
FPL
2006
Springer
242views Hardware» more  FPL 2006»
15 years 7 months ago
TMD-MPI: An MPI Implementation for Multiple Processors Across Multiple FPGAs
With current FPGAs, designers can now instantiate several embedded processors, memory units, and a wide variety of IP blocks to build a single-chip, high-performance multiprocesso...
Manuel Saldaña, Paul Chow
SOSP
2007
ACM
16 years 14 days ago
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that only approved code can execute in kernel mode ove...
Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig