Sciweavers

1875 search results - page 31 / 375
» Modeling the Security of Steganographic Systems
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
13 years 5 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
CCS
2008
ACM
14 years 28 days ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
14 years 5 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
I3E
2001
196views Business» more  I3E 2001»
14 years 10 days ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
JPDC
2007
86views more  JPDC 2007»
13 years 10 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin