Sciweavers

3516 search results - page 220 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
121
Voted
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 7 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
97
Voted
CMOT
2002
90views more  CMOT 2002»
15 years 3 months ago
Organizational Design, Information Transfer, and the Acquisition of Rent-Producing Resources
Within the resource-based view of the firm, a dynamic story has emerged in which the knowledge accumulated over the history of a firm and embedded in organizational routines and s...
Michael J. Lenox
130
Voted
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
COMPUTER
2006
160views more  COMPUTER 2006»
15 years 3 months ago
Developing Applications Using Model-Driven Design Environments
Model-driven development (MDD) is an emerging paradigm that improves the software development lifecycle, particularly for large software systems by providing a higherabstraction fo...
Krishnakumar Balasubramanian, Aniruddha S. Gokhale...
118
Voted
KES
2005
Springer
15 years 9 months ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel