Sciweavers

1005 search results - page 43 / 201
» Information systems security engineering: a critical compone...
Sort
View
IPPS
1999
IEEE
14 years 1 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
DAC
2006
ACM
14 years 9 months ago
Efficient simulation of critical synchronous dataflow graphs
Simulation and verification using electronic design automation (EDA) tools are key steps in the design process for communication and signal processing systems. The synchronous dat...
Chia-Jui Hsu, José Luis Pino, Ming-Yung Ko,...
ISORC
2005
IEEE
14 years 2 months ago
EarlGray: A Component-Based Java Virtual Machine for Embedded Systems
EarlGray is a component-based Java virtual machine (JVM) that can be configured to satisfy various kinds of requirements for building future information appliances and embedded s...
Hiroo Ishikawa, Tatsuo Nakajima
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
14 years 2 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier
WOSS
2004
ACM
14 years 2 months ago
Towards preserving correctness in self-managed software systems
Currently, paradigms such as component-based software development and service-oriented software architectures promote modularization of software systems into highly decoupled and ...
Lieven Desmet, Nico Janssens, Sam Michiels, Frank ...