Sciweavers

1005 search results - page 63 / 201
» Information systems security engineering: a critical compone...
Sort
View
ANSS
2007
IEEE
14 years 3 months ago
Evaluating the Design of Biological Cells Using a Computer Workbench
For embedded systems as well as for biological cell systems, design is a feature that defines their identity. The assembly of different components in designs of both systems can ...
Tessa E. Pronk, Simon Polstra, Andy D. Pimentel, T...
IEEECIT
2010
IEEE
13 years 7 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
SOQUA
2004
13 years 10 months ago
Measuring Component Performance Using A Systematic Approach and Environment
: As more third-party software components are available in the commercial market, more people begin to use the component-based software engineering approach to developing component...
Jerry Gao, Chandra S. Ravi, Raquel Espinoza
CCS
2009
ACM
14 years 3 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
EMSOFT
2009
Springer
14 years 3 months ago
Handling mixed-criticality in SoC-based real-time embedded systems
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded systems, but it poses significant challenges from a design and verification point of view. In ...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Y...