Sciweavers

3516 search results - page 248 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
173
Voted
NORDSEC
2009
Springer
15 years 8 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
125
Voted
STEP
2005
IEEE
15 years 9 months ago
Adoption-Centric Software Maintenance Process Improvement via Information Integration
Software process improvement is an iterative activity, normally involving measurement, analysis, and change. For most organizations, the existing software process has substantial ...
Shihong Huang, Scott R. Tilley, Michael VanHilst, ...
119
Voted
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 8 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
115
Voted
ACSD
2003
IEEE
103views Hardware» more  ACSD 2003»
15 years 9 months ago
Design Validation of ZCSP with SPIN
— We consider the problem of specifying a model of the Zero Copy Secured Protocol for the purpose of LTL verification with the SPIN Model Checker. ZCSP is based on Direct Memory...
Vincent Beaudenon, Emmanuelle Encrenaz, Jean Lou D...
CAISE
2003
Springer
15 years 9 months ago
Designing a Federated Multimedia Information System on the Semantic Web
A federated Web-based multimedia information system on one hand gathers its data from various Web sources, on the other hand offers the end-user a rich semantics describing its co...
Richard Vdovjak, Peter Barna, Geert-Jan Houben