Sciweavers

2517 search results - page 154 / 504
» Secure Deployment of Components
Sort
View
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
15 years 10 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
ISI
2006
Springer
15 years 3 months ago
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics
This paper aims to develop a new statistical measure to identify significant correlations among multiple events with spatial and temporal components. This new measure, ( , )K r t ,...
Jian Ma, Daniel Dajun Zeng, Hsinchun Chen
IADIS
2003
15 years 5 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
123
Voted
ASM
2010
ASM
16 years 24 days ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
IEEEARES
2007
IEEE
15 years 10 months ago
Security Requirements for a Semantic Service-oriented Architecture
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
Stefan Durbeck, Rolf Schillinger, Jan Kolter