Sciweavers

11603 search results - page 121 / 2321
» Securing Embedded Systems
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
SP
2002
IEEE
160views Security Privacy» more  SP 2002»
13 years 8 months ago
On the Composition of Secure Systems
When complex systems are constructed from simpler components it is important to know how properties of the components behave under composition. In this article, we present various...
Heiko Mantel
CCS
2006
ACM
14 years 20 days ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
TON
2010
93views more  TON 2010»
13 years 7 months ago
On suitability of Euclidean embedding for host-based network coordinate systems
Abstract—In this paper, we investigate the suitability of embedding Internet hosts into a Euclidean space given their pairwise distances (as measured by round-trip time). Using t...
Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan ...
SAC
2006
ACM
14 years 2 months ago
Event-driven scheduling for dynamic workload scaling in uniprocessor embedded systems
Many embedded systems are designed to take timely reactions to the occurrences of interested scenarios. Sometimes transient overloads might be experienced due to hardware malfunct...
Li-Pin Chang