Sciweavers

3482 search results - page 249 / 697
» Designing for security
Sort
View
122
Voted
ACSAC
2007
IEEE
15 years 6 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
142
Voted
CODES
2007
IEEE
15 years 9 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
160
Voted
INFOCOM
2010
IEEE
14 years 12 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
141
Voted
ACSD
2003
IEEE
104views Hardware» more  ACSD 2003»
15 years 6 months ago
A Framework for the Development of Protocols
We present the -Spaces framework, a tool designed to support every step of a security protocol's life cycle. Its Integrated Development Environment (IDE) eases the task of pr...
Federico Crazzolara, Giuseppe Milicia
OOPSLA
2007
Springer
15 years 8 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden