Sciweavers

11603 search results - page 134 / 2321
» Securing Embedded Systems
Sort
View
HOTOS
2007
IEEE
14 years 1 months ago
End-to-End Web Application Security
Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the ...
Úlfar Erlingsson, V. Benjamin Livshits, Yin...
CIKM
2010
Springer
13 years 8 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 1 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
APSEC
2006
IEEE
14 years 1 days ago
Using Operational Architecture to Model Embedded Software
Almost methods in embedded software modeling take software architecture as one of the crucial parts of the design process. Since a principal role of embedded software is the inter...
Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 10 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja