Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Doing agile development in a relatively inelastic environment, where policies and procedures are virtually unchangeable, creates an impedance mismatch between the agile team and i...
Rapid product or service deployment is most commonly thought of in the corporate, rather than academic, environment. Utilizing a rapid deployment process and a number of highly de...
We present a new software system architecture for the implementation of hard real-time applications. The core of the system is a microkernel whose reactivity (interrupt handling a...
Christoph M. Kirsch, Marco A. A. Sanvido, Thomas A...
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...