Sciweavers

3516 search results - page 314 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
TSMC
2008
113views more  TSMC 2008»
15 years 4 months ago
Computational Methods for Verification of Stochastic Hybrid Systems
Stochastic hybrid system (SHS) models can be used to analyze and design complex embedded systems that operate in the presence of uncertainty and variability. Verification of reacha...
Xenofon D. Koutsoukos, Derek Riley
MEDES
2009
ACM
15 years 10 months ago
Integrated service engineering workbench: service engineering for digital ecosystems
The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. According to Papazoglou et al., one challenge is to develop services...
Gregor Scheithauer, Konrad Voigt, Veli Bicer, Matt...
141
Voted
ATAL
2006
Springer
15 years 8 months ago
Enhancing agent-oriented models with aspects
The modular representation of concerns is imperative in the design modeling of multi-agent systems (MASs). However, MAS designers typically face a number of concerns that inherent...
Alessandro F. Garcia, Christina Chavez, Ricardo Ch...
ASPLOS
2008
ACM
15 years 6 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
IJIPT
2010
147views more  IJIPT 2010»
15 years 2 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj