Sciweavers

3516 search results - page 222 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
122
Voted
IFIP13
2004
15 years 5 months ago
Designing Distributed Task Performance in Safety-Critical Systems Equipped With Mobile Devices
: This paper describes a method aiming to support the design of interactive-safety critical systems. The method proposes an original integration of approaches usually considered se...
Ana-Maria Marhan, Fabio Paternò, Carmen San...
117
Voted
RTAS
2005
IEEE
15 years 9 months ago
Robust Control/Scheduling Co-Design: Application to Robot Control
Control systems running on a computer are subject to timing disturbances coming from implementation constraints. Fortunately closed-loop systems behave robustly w.r.t. modelling e...
Daniel Simon, David Robert, Olivier Sename
139
Voted
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 10 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
15 years 10 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
131
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger