Sciweavers

897 search results - page 53 / 180
» Security Requirements for RFID Computing Systems
Sort
View
COMSUR
2007
101views more  COMSUR 2007»
13 years 8 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
AGENTS
1997
Springer
14 years 8 days ago
Distributed Diagnosis by Vivid Agents
Many systems, such as large manufacturing systems, telecommunication networks, or homeautomation systems, require distributed monitoring and diagnosis. In this article, we introdu...
Michael Schroeder, Gerd Wagner
PUC
2006
72views more  PUC 2006»
13 years 8 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
OOPSLA
2010
Springer
13 years 6 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...
SMC
2007
IEEE
108views Control Systems» more  SMC 2007»
14 years 2 months ago
Cybersecurity for electric power control and automation systems
—Disruption of electric power operations can be catastrophic on the national security and economy. Due to the complexity of widely dispersed assets and the interdependency betwee...
Chee-Wooi Ten, Manimaran Govindarasu, Chen-Ching L...