Sciweavers

443 search results - page 62 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
ESAS
2004
Springer
14 years 1 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 2 days ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
IJMMS
2006
119views more  IJMMS 2006»
13 years 7 months ago
Pair programming productivity: Novice-novice vs. expert-expert
Agile Software Development methodologies have grown in popularity both among academic researchers and industrial practitioners. Among the various methodologies or practices propos...
Kim Man Lui, Keith C. C. Chan
CMOT
2011
12 years 11 months ago
A generic architecture for redesign of organizations triggered by changing environmental circumstances
Artificial Intelligence has contributed (formal) design models and software support tools to application areas such as architecture, engineering and software design. This paper exp...
Mark Hoogendoorn, Catholijn M. Jonker, Jan Treur