Sciweavers

8503 search results - page 272 / 1701
» Secure Software Architectures
Sort
View
130
Voted
IPPS
2006
IEEE
15 years 10 months ago
Securing embedded programmable gate arrays in secure circuits
The purpose of this article is to propose a survey of possible approaches for implementing embedded reconfigurable gate arrays into secure circuits. A standard secure interfacing ...
Nicolas Valette, Lionel Torres, Gilles Sassatelli,...
INFSOF
2006
91views more  INFSOF 2006»
15 years 4 months ago
Bridging patterns: An approach to bridge gaps between SE and HCI
Adding usability improving solutions during late stage development is to some extent restricted by the software architecture. However, few software engineers and human
Eelke Folmer, Martijn van Welie, Jan Bosch
IJOE
2008
98views more  IJOE 2008»
15 years 4 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 9 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
ISCIS
2004
Springer
15 years 10 months ago
Coordinating Distributed Autonomous Agents with a Real-Time Database: The CAMBADA Project
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such ...
Luís Almeida, Frederico Santos, Tullio Facc...