Sciweavers

617 search results - page 36 / 124
» Research Challenges for the Security of Control Systems
Sort
View
ICSE
2000
IEEE-ACM
15 years 3 months ago
Software configuration management: a roadmap
This paper, in the first chapter summarizes the state of the art in SCM, showing the evolution along the last 25 years. Chapter 2 shows the current issues and current research wor...
Jacky Estublier
ICPP
2002
IEEE
15 years 4 months ago
Integrating Trust into Grid Resource Management Systems
Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for controlled sharing of resources across institutional bo...
Farag Azzedin, Muthucumaru Maheswaran
DSN
2005
IEEE
15 years 5 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
FASE
2008
Springer
15 years 1 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 4 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev