Sciweavers

3516 search results - page 294 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
112
Voted
EMSOFT
2006
Springer
15 years 7 months ago
Incremental schedulability analysis of hierarchical real-time components
Embedded systems are complex as a whole but consist of smaller independent modules minimally interacting with each other. This structure makes embedded systems amenable to composi...
Arvind Easwaran, Insik Shin, Oleg Sokolsky, Insup ...
NOSSDAV
2009
Springer
15 years 10 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda
CHI
2005
ACM
16 years 4 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
ICSM
2008
IEEE
15 years 10 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
IJCNN
2007
IEEE
15 years 10 months ago
Modeling Overlapping Execution/Observation Brain Pathways
— Recent brain imaging studies on primates revealed that a network of brain areas is activated both during observation and during execution of movements. The present work aims at...
Michail Maniadakis, Manolis Hourdakis, Panos E. Tr...