Sciweavers

1801 search results - page 9 / 361
» Memory-Centric Security Architecture
Sort
View
AGENTS
1997
Springer
13 years 11 months ago
Fusing Autonomy and Sociability in Robots
Quoting somerobotic examples, I willlist some key issues in fusing autonomy and sociability: tools and control architecture, attention, behavior matching, embodiment, similarity, ...
Yasuo Kuniyoshi
ESSOS
2011
Springer
12 years 10 months ago
The Security Twin Peaks
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of thi...
Thomas Heyman, Koen Yskout, Riccardo Scandariato, ...
CCS
2011
ACM
12 years 7 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
ACSAC
2004
IEEE
13 years 10 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
JPDC
2006
141views more  JPDC 2006»
13 years 7 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...