Sciweavers

2337 search results - page 101 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
WICSA
2004
14 years 11 months ago
Software Architecture for Large-Scale, Distributed, Data-Intensive Systems
The sheer amount of data produced by modern science research has created a need for the construction and understanding of "data-intensive systems", largescale, distribut...
Chris Mattmann, Daniel J. Crichton, J. Steven Hugh...
MHCI
2005
Springer
15 years 3 months ago
Just-for-us: a context-aware mobile information system facilitating sociality
Mobile computer technologies are increasingly being appropriated and used to facilitate people’s social life outside the work domain. Addressing this emerging domain of use, we ...
Jesper Kjeldskov, Jeni Paay
CAISE
1999
Springer
15 years 2 months ago
Design of Object Caching in a CORBA OTM System
Abstract. CORBA Object Transaction Monitors (OTM) refer to a middleware technology that enable the building of transactional, objectoriented information systems running in distribu...
Thomas Sandholm, Stefan Tai, Dirk Slama, Eamon Wal...
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 3 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
SIGCOMM
2009
ACM
15 years 4 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...