Sciweavers

2629 search results - page 311 / 526
» complex 2009
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 11 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
133
Voted
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 11 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
15 years 11 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
146
Voted
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 11 months ago
Issues Related to Development of E/E Product Line Architectures in Heavy Vehicles
The amount of electronics in vehicles is growing quickly, thus systems are becoming increasingly complex which makes the engineering of these software intensive systems more and m...
Peter Wallin, Stefan Johnsson, Jakob Axelsson
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 11 months ago
A Systematic Approach to Improve Communication for Emergency Response
The importance of communication, information sharing and interoperability in an emergency response scenario have risen recently based on the frequency of disasters throughout the ...
Raheleh B. Dilmaghani, Ramesh R. Rao