Sciweavers

690 search results - page 109 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
176
Voted
DSD
2011
IEEE
200views Hardware» more  DSD 2011»
14 years 3 months ago
Microthreading as a Novel Method for Close Coupling of Custom Hardware Accelerators to SVP Processors
Abstract—We present a new low-level interfacing scheme for connecting custom accelerators to processors that tolerates latencies that usually occur when accessing hardware accele...
Jaroslav Sykora, Leos Kafka, Martin Danek, Lukas K...
145
Voted
RULEML
2005
Springer
15 years 9 months ago
Design and Implementation of an ECA Rule Markup Language
an Abstract Syntax and Direct-Model Theoretic Semantics for RuleML . 45 Adrian Giurca and Gerd Wagner A Semantic Web Framework for Interleaving Policy Reasoning and External Servic...
Marco Seiriö, Mikael Berndtsson
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
COORDINATION
2009
Springer
16 years 4 months ago
Multicore Scheduling for Lightweight Communicating Processes
Process-oriented programming is a design methodology in which software applications are constructed from communicating concurrent processes. A process-oriented design is typically ...
Carl G. Ritson, Adam T. Sampson, Fred R. M. Barnes
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer