Sciweavers

2281 search results - page 160 / 457
» Security Patterns and Secure Systems Design
Sort
View
SAFECOMP
1998
Springer
15 years 4 months ago
Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture
By-wire systems have been established for several years in the area of aircraft construction and there are now approaches to utilize this technology in vehicles. The required elect...
Thomas Ringler, J. Steiner, R. Belschner, Bernd He...
81
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
DIAU
2000
Springer
15 years 5 months ago
Web MIXes: A System for Anonymous and Unobservable Internet Access
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as ...
Oliver Berthold, Hannes Federrath, Stefan Köp...
92
Voted
JNW
2008
103views more  JNW 2008»
15 years 19 days ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
63
Voted
GIL
2010
14 years 10 months ago
Light Competition in Chinese Cabbage/Maize Strip Intercropping Systems
: Due to drastic socio-economic changes traditional intercropping systems in China are endangered. New high yielding intercropping systems that can easily be mechanized have to be ...
Til Feike, Sebastian Munz, Simone Graeff-Hönn...