Sciweavers

3516 search results - page 258 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
EUROMICRO
1998
IEEE
15 years 8 months ago
System Level Modelling for Hardware/Software Systems
Industry is facing a crisis in the design of complex hardware/software systems. Due to the increasing complexity, the gap between the generation of a product idea and the realisat...
Jeroen Voeten, P. H. A. van der Putten, Marc Geile...
IFIPTM
2010
145views Management» more  IFIPTM 2010»
15 years 2 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 10 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
109
Voted
ASPDAC
2006
ACM
176views Hardware» more  ASPDAC 2006»
15 years 9 months ago
Conversion of reference C code to dataflow model: H.264 encoder case study
– Model-based design is widely accepted in developing complex embedded system under intense time-to-market pressure. While it promises improved design productivity, the main bott...
Hyeyoung Hwang, Taewook Oh, Hyunuk Jung, Soonhoi H...
IJNSEC
2007
121views more  IJNSEC 2007»
15 years 3 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen