Sciweavers

3516 search results - page 311 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SACMAT
2009
ACM
15 years 10 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
159
Voted
TPDS
2008
106views more  TPDS 2008»
15 years 4 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin
142
Voted
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 5 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
TASE
2009
IEEE
15 years 11 months ago
Environmental Simulation of Real-Time Systems with Nested Interrupts
Interrupts are important aspects of real-time embedded systems to handle events in time. When there exist nested interrupts in a real-time system, and an urgent interrupt is allow...
Guoqiang Li, Shoji Yuen, Masakazu Adachi
155
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as...
Nevena Stolba, Marko Banek, A. Min Tjoa