Sciweavers

2517 search results - page 316 / 504
» Secure Deployment of Components
Sort
View
FPL
2004
Springer
141views Hardware» more  FPL 2004»
14 years 2 months ago
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs
—This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and...
Zachary K. Baker, Viktor K. Prasanna
RE
2004
Springer
14 years 2 months ago
Quantifying Non-Functional Requirements: A Process Oriented Approach
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
Raquel L. Hill, Jun Wang, Klara Nahrstedt
ICDCSW
2003
IEEE
14 years 2 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
WETICE
1996
IEEE
14 years 1 months ago
An enterprise assurance framework
This paper explores generating and conveying confidence in enterprise security. An enterprise assurance framework provides a structure enterprise assurance evidence that strengthe...
Douglas J. Landoll, Jeffrey R. Williams
FMCO
2007
Springer
124views Formal Methods» more  FMCO 2007»
14 years 1 months ago
Certification Using the Mobius Base Logic
This paper describes a core component of Mobius' Trusted Code Base, the Mobius base logic. This program logic facilitates the transmission of certificates that are generated u...
Lennart Beringer, Martin Hofmann, Mariela Pavlova