Sciweavers

12637 search results - page 198 / 2528
» Security for Extensible Systems
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 9 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 4 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 4 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
ICISS
2007
Springer
14 years 3 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
SASO
2007
IEEE
14 years 3 months ago
Adaptive SSL: Design, Implementation and Overhead Analysis
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Christiaan J. Lamprecht, Aad P. A. van Moorsel