Sciweavers

1352 search results - page 93 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ICWS
2004
IEEE
13 years 10 months ago
Grid Resources for Industrial Applications
We introduce Grid Resources for Industrial Applications (GRIA), a project that aims to enable commercial use of the Grid. GRIA enables service providers to rent out spare CPU cycl...
Steve Taylor, Mike Surridge, Darren Marvin
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 9 months ago
Runtime monitoring for next generation Java ME platform
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...
CCS
2010
ACM
13 years 9 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
PPAM
2007
Springer
14 years 3 months ago
Enhancing Productivity in High Performance Computing through Systematic Conditioning
Abstract. In order to take full advantage of high-end computing platforms, scientific applications often require modifications to source codes, and to their build systems that ge...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...
CCS
2007
ACM
14 years 3 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros