Sciweavers

211 search results - page 9 / 43
» Integrity Protection for Revision Control
Sort
View
DAC
2007
ACM
14 years 9 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
DATE
2003
IEEE
186views Hardware» more  DATE 2003»
14 years 1 months ago
Formal Methods for Integration of Automotive Software
Novel functionality, configurability and higher efficiency in automotive systems require sophisticated embedded software, as well as distributed software development between man...
Marek Jersak, Kai Richter, Rolf Ernst, Jörn-C...
DATE
2008
IEEE
79views Hardware» more  DATE 2008»
14 years 2 months ago
A Programmable and Low-EMI Integrated Half-Bridge Driver in BCD Technology
This paper presents the design and the laboratory results of an integrated half-bridge driver for power electronic systems in a 0.35 µm Bipolar CMOS DMOS (BCD) technology. The pr...
Francesco D'Ascoli, Luca Bacciarelli, Massimiliano...
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 9 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
SAC
2009
ACM
14 years 3 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...