Sciweavers

67 search results - page 8 / 14
» Security Parallels between People and Pervasive Devices
Sort
View
EUROPAR
2007
Springer
14 years 2 months ago
Getting 10 Gb/s from Xen: Safe and Fast Device Access from Unprivileged Domains
The networking performance available to Virtual Machines (VMs) can be low due to the inefficiencies of transferring network packets between the host domain and guests. This can lim...
Kieran Mansley, Greg Law, David Riddoch, Guido Bar...
NSPW
2004
ACM
14 years 2 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
WIAS
2010
102views more  WIAS 2010»
13 years 7 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
NSPW
2004
ACM
14 years 2 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 8 months ago
Development of a Context Aware Virtual Smart Home Simulator
Context awareness is the most important research area in ubiquitous computing. In particular, for smart home, context awareness attempts to bring the best services to the home hab...
Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi