Sciweavers

2814 search results - page 60 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
MIE
2008
119views Healthcare» more  MIE 2008»
15 years 5 months ago
Reliable Personal Health Records
A number of applications based on personal health records (PHRs) are emerging in the field of health care and wellness. PHRs empower patients by giving them control over their heal...
Ton van Deursen, Paul Koster, Milan Petkovic
GLVLSI
2006
IEEE
126views VLSI» more  GLVLSI 2006»
15 years 10 months ago
Hardware/software partitioning of operating systems: a behavioral synthesis approach
In this paper we propose a hardware real time operating system (HW-RTOS) solution that makes use of a dedicated hardware in order to replace the standard support provided by the P...
Sathish Chandra, Francesco Regazzoni, Marcello Laj...
STORAGESS
2006
ACM
15 years 10 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
CCS
2007
ACM
15 years 10 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
15 years 10 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...