Sciweavers

1788 search results - page 65 / 358
» Integrating Security into the Curriculum
Sort
View
AINA
2007
IEEE
15 years 6 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
ISSE
2010
14 years 10 months ago
An integrated multi-view model evolution framework
A UML model of a software system can be represented by a sequence of model transformations, starting from an empty model. To effectively support the design of complex systems, tra...
Volker Stolz
ECEH
2006
144views Healthcare» more  ECEH 2006»
15 years 1 months ago
Process Based Data Logistics: Data Integration for Healthcare Applications
Data integration in medical applications is a crucial and sensitive task. It turns out that there are rigid factors like heterogeneous, distributed data sources, security, and comp...
Stefan Jablonski
GPC
2009
Springer
14 years 9 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
CSREASAM
2006
15 years 1 months ago
Adaptive Security Metrics for Computer Systems
The major concern for a computer system is its security and integrity. It is necessary to check the security level of your system and keep it updated. This can be best achieved by ...
Satish Baddelpeli, Gregory Vert