Sciweavers

1353 search results - page 23 / 271
» Securing Current and Future Process Control Systems
Sort
View
ICDCSW
2005
IEEE
15 years 8 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
SIGCOMM
2010
ACM
15 years 2 months ago
Symbiotic routing in future data centers
Building distributed applications for data centers is hard. CamCube explores whether replacing the traditional switchbased network with a directly connected topology makes it easi...
Hussam Abu-Libdeh, Paolo Costa, Antony I. T. Rowst...
RE
1999
Springer
15 years 6 months ago
Bridging the Gap Between Past and Future in RE: A Scenario-Based Approach
Requirements Engineering (RE) investigates the impact of a future-oriented change vision, but the move towards this vision must consider a context heavily shaped by the past. As R...
Peter Haumer, Matthias Jarke, Klaus Pohl, Patrick ...
TELE
2008
85views more  TELE 2008»
15 years 2 months ago
Iris recognition and the challenge of homeland and border control security in UAE
This article discusses the implementation of iris recognition in improving the security of border control systems in the United Arab Emirates. The article explains the significanc...
Ahmad N. Al-Raisi, Ali M. Al-Khouri
139
Voted
NSDI
2008
15 years 4 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...