Sciweavers

598 search results - page 101 / 120
» Developing E-Government Integrated Infrastructures: A Case S...
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 2 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
ICST
2009
IEEE
14 years 2 months ago
WS-TAXI: A WSDL-based Testing Tool for Web Services
Web Services (WSs) are the W3C-endorsed realization of the Service-Oriented Architecture (SOA). Since they are supposed to be implementation-neutral, WSs are typically tested blac...
Cesare Bartolini, Antonia Bertolino, Eda Marchetti...
BPM
2009
Springer
146views Business» more  BPM 2009»
14 years 2 months ago
Instantaneous Soundness Checking of Industrial Business Process Models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications and o...
Dirk Fahland, Cédric Favre, Barbara Jobstma...
IEEEARES
2007
IEEE
14 years 1 months ago
From Trust to Dependability through Risk Analysis
The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...
ICICS
2007
Springer
14 years 1 months ago
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
Autonomous spreading malware in the form of worms or bots has become a severe threat in today’s Internet. Collecting the sample as early as possible is a necessary precondition f...
Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu ...