Sciweavers

949 search results - page 104 / 190
» Design methods for security and trust
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
HOST
2009
IEEE
14 years 1 months ago
New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
Hardware Trojans in integrated circuits and systems have become serious concern to fabless semiconductor industry and government agencies in recent years. Most of the previously p...
Hassan Salmani, Mohammad Tehranipoor, Jim Plusquel...
SPC
2005
Springer
14 years 2 months ago
Security Issues for Pervasive Personalized Communication Systems
Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal p...
Bertin Klein, Tristan Miller, Sandra Zilles
SOSE
2006
IEEE
14 years 3 months ago
Service Engineering Design Patterns
Design of service-oriented applications differs from design of the component-based applications in granularity, abstraction and dynamic environment in which binding between client...
Nikola Milanovic
OOPSLA
2005
Springer
14 years 2 months ago
CanonSketch and TaskSketch: innovative modeling tools for usage-centered design
Two experimental tools to support usage-centered design using l use cases and canonical abstract prototypes are described. The models and methods of usage-centered design are outl...
Larry L. Constantine, Pedro Campos