Sciweavers

3516 search results - page 264 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICWS
2004
IEEE
15 years 5 months ago
Managing and Securing Web Services with VPNs
Web Services constitute a set of technologies that many believe will change the web communication landscape within the next few years. They offer standardized and easy communicati...
Lina Alchaal, Vincent Roca, Michel Habert
CCS
2006
ACM
15 years 7 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
HPDC
2010
IEEE
15 years 4 months ago
A GPU accelerated storage system
Massively multicore processors, like, for example, Graphics Processing Units (GPUs), provide, at a comparable price, a one order of magnitude higher peak performance than traditio...
Abdullah Gharaibeh, Samer Al-Kiswany, Sathish Gopa...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 8 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
ISCAS
2002
IEEE
111views Hardware» more  ISCAS 2002»
15 years 8 months ago
CASCADE - configurable and scalable DSP environment
As the complexity of embedded systems grows rapidly, it is common to accelerate critical tasks with hardware. Designers usually use off-the-shelf components or licensed IP cores t...
Tay-Jyi Lin, Chein-Wei Jen