Sciweavers

2814 search results - page 48 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
15 years 10 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
13 years 12 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
DSN
2007
IEEE
15 years 10 months ago
Reliability Techniques for RFID-Based Object Tracking Applications
Radio Frequency Identification (RFID) technology has the potential to dramatically improve numerous industrial practices. However, it still faces many challenges, including secur...
Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittw...
ICALP
2004
Springer
15 years 9 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler
ESE
2002
112views Database» more  ESE 2002»
15 years 4 months ago
An Empirical Method for Selecting Software Reliability Growth Models
Estimating remaining defects or failures in software can help test managers make release decisions during testing. Several methods exist to estimate defect content, among them a v...
Catherine Stringfellow, Anneliese Amschler Andrews