Sciweavers

2178 search results - page 295 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCS
2004
ACM
15 years 11 months ago
On the effectiveness of address-space randomization
Address-space randomization is a technique used to fortify systems against bu er over ow attacks. The idea is to introduce arti cial diversity by randomizing the memory location o...
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh...
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
15 years 12 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
ISI
2007
Springer
15 years 5 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
MEDES
2009
ACM
16 years 11 hour ago
Integrated service engineering workbench: service engineering for digital ecosystems
The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. According to Papazoglou et al., one challenge is to develop services...
Gregor Scheithauer, Konrad Voigt, Veli Bicer, Matt...
DATE
2006
IEEE
91views Hardware» more  DATE 2006»
15 years 11 months ago
Is "Network" the next "Big Idea" in design?
As the complexity of nowadays systems continues to grow, we are moving away from creating individual components from scratch, toward methodologies that emphasize composition of re...
Radu Marculescu, Jan M. Rabaey, Alberto L. Sangiov...