Sciweavers

3516 search results - page 277 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
166
Voted
SRDS
2007
IEEE
15 years 10 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
ISSS
2000
IEEE
94views Hardware» more  ISSS 2000»
15 years 8 months ago
A Transformational Approach to Constraint Relaxation of a Time-driven Simulation Model
Time-driven simulation models typically model timing in an idealized way that is over-constrained and cannot be directly implemented. In this paper we present a transformation to ...
Marek Jersak, Ying Cai, Dirk Ziegenbein, Rolf Erns...
161
Voted
CCS
2008
ACM
15 years 6 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
15 years 7 months ago
Predictive models for multimedia applications power consumption based on use-case and OS level analysis
—Power management at any abstraction level is a key issue for many mobile multimedia and embedded applications. In this paper a design workflow to generate system-level power mo...
Patrick Bellasi, William Fornaciari, David Siorpae...
ACSW
2006
15 years 5 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...