Sciweavers

434 search results - page 35 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
IMCS
2007
77views more  IMCS 2007»
13 years 8 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
RTSS
2002
IEEE
14 years 1 months ago
Maximizing the System Value while Satisfying Time and Energy Constraints
Typical real-time scheduling theory has addressed deadline and energy constraints as well as deadline and reward constraints simultaneously in the past. However, we believe that e...
Cosmin Rusu, Rami G. Melhem, Daniel Mossé
ISCAS
2006
IEEE
154views Hardware» more  ISCAS 2006»
14 years 3 months ago
FleXilicon: a reconfigurable architecture for multimedia and wireless communications
— This paper proposes a new reconfigurable architecture for multi-media and wireless communications. The proposed architecture addresses three critical design issues with the loo...
Jong-Suk Lee, Dong Sam Ha
CAISE
2006
Springer
14 years 20 days ago
Deviational Analyses for Validating Regulations on Real Systems
Deviational analysis is a traditional way of exploring the safety of systems. The results of deviational analysis contribute to traditional safety cases and safety arguments. We ex...
Fiona Polack, Thitima Srivatanakul, Tim Kelly, Joh...
SOUPS
2006
ACM
14 years 2 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson