Sciweavers

11603 search results - page 115 / 2321
» Securing Embedded Systems
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
14 years 9 months ago
Exchanging Intensional XML Data
XML is becoming the universal format for data exchange between applications. Recently, the emergence of Web services as standard means of publishing and accessing data on the Web ...
Tova Milo, Serge Abiteboul, Bernd Amann, Omar Benj...
FPL
2004
Springer
154views Hardware» more  FPL 2004»
14 years 2 months ago
High Performance True Random Number Generator in Altera Stratix FPLDs
Abstract. The paper presents a high performance True Random Number Generator (TRNG) embedded in Altera Stratix Field Programmable Logic Devices (FPLDs). As a source of randomness, ...
Viktor Fischer, Milos Drutarovský, Martin S...
ASWEC
2005
IEEE
14 years 2 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
LCTRTS
1998
Springer
14 years 1 months ago
A Tool to Assist in Fine-Tuning and Debugging Embedded Real-Time Systems
: During the latter stages of a software product cycle, developers may be faced with the task of fine-tuning an embedded system that is not meeting all of its timing requirements. ...
Gaurav Arora, David B. Stewart