Sciweavers

1352 search results - page 92 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ASPDAC
2005
ACM
86views Hardware» more  ASPDAC 2005»
14 years 2 months ago
Thermal-driven multilevel routing for 3-D ICs
3-D IC has a great potential for improving circuit performance and degree of integration. It is also an attractive platform for system-on-chip or system-in-package solutions. A cr...
Jason Cong, Yan Zhang
PCI
2005
Springer
14 years 2 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
SOSP
2009
ACM
14 years 5 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
GLOBECOM
2010
IEEE
13 years 7 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
WETICE
2005
IEEE
14 years 2 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick