Sciweavers

1209 search results - page 82 / 242
» Security as a new dimension in embedded system design
Sort
View
CMS
2006
175views Communications» more  CMS 2006»
14 years 11 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
EEE
2004
IEEE
15 years 1 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar
DATE
2009
IEEE
139views Hardware» more  DATE 2009»
15 years 4 months ago
Reliable mode changes in real-time systems with fixed priority or EDF scheduling
Abstract—Many application domains require adaptive realtime embedded systems that can change their functionality over time. In such systems it is not only necessary to guarantee ...
Nikolay Stoimenov, Simon Perathoner, Lothar Thiele
TEC
2002
166views more  TEC 2002»
14 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
ARCS
2006
Springer
15 years 1 months ago
An Operating System Infrastructure for Fault-Tolerant Reconfigurable Networks
Abstract. Dynamic hardware reconfiguration is becoming a key technology in embedded system design that offers among others new potentials in dependable computing. To make system de...
Dirk Koch, Thilo Streichert, Steffen Dittrich, Chr...