Sciweavers

530 search results - page 75 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
ICSOC
2007
Springer
15 years 3 months ago
User-Driven Service Lifecycle Management - Adopting Internet Paradigms in Telecom Services
The user-centric service creation paradigm set out in Web 2.0 technologies on the Internet allows users to define and share their new content and applications. Open services and in...
Juan C. Yelmo, Rubén Trapero, José M...
IMSA
2001
131views Multimedia» more  IMSA 2001»
14 years 11 months ago
SORBA: Shared Object Request Broker Architecture for Peer Computing
: In this paper, we proposed a SORBA (Shared Object Request Broker Architecture) model, an objectbased P2P model, which complies with an open architecture, and manages resources af...
U. G. Kang, H. J. Hwang, S. H. Lee, C. J. Wang
CCS
2004
ACM
15 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 4 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
FDL
2008
IEEE
15 years 4 months ago
Model-based Design Space Exploration for RTES with SysML and MARTE
The features of the emerging modeling languages for system design allow designers to build models of almost any kind of heterogeneous hardware-software systems, including Real Tim...
Marcello Mura, Luis Gabriel Murillo, Mauro Prevost...