Sciweavers

3482 search results - page 102 / 697
» Designing for security
Sort
View
111
Voted
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
15 years 9 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...
112
Voted
ATAL
2005
Springer
15 years 8 months ago
A secure architectural description language for agent systems
Multi-agent systems are now being considered a promising architectural approach for building Internet-based applications. One of the most critical and important aspects of softwar...
Haralambos Mouratidis, Manuel Kolp, Stéphan...
115
Voted
DAC
2007
ACM
16 years 3 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
108
Voted
PST
2004
15 years 4 months ago
A Diagrammatical Framework for Information Systems Attacks
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...
Terry Roebuck
108
Voted
PLDI
2006
ACM
15 years 8 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith