Sciweavers

1788 search results - page 29 / 358
» Integrating Security into the Curriculum
Sort
View
ER
2009
Springer
166views Database» more  ER 2009»
15 years 4 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
VTC
2007
IEEE
150views Communications» more  VTC 2007»
15 years 3 months ago
Antenna Advancement Techniques and Integration of RFID Electronics on Organic Substrates for UHF RFID Applications in Automotive
— In this paper, design requirements and advanced approaches for improved performance UHF radio frequency identification (RFID) tags are presented. Organic substrates are examine...
Li Yang, Amin Rida, Jiexin Li, Manos M. Tentzeris
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
15 years 1 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
TRUST
2009
Springer
15 years 4 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
64
Voted
DISCEX
2003
IEEE
15 years 2 months ago
Integrated Security Services for Dynamic Coalitions
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access permissions to coalition members based on negotiated r...
Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bo...