Sciweavers

2337 search results - page 26 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ICS
2003
Tsinghua U.
14 years 23 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
HPCA
2006
IEEE
14 years 8 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
CCS
2006
ACM
13 years 11 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
AGENTS
2000
Springer
13 years 12 months ago
Tools for Developing and Monitoring Agents in Distributed Multi-Agent Systems
Before the powerful agent programming paradigm can be adopted in commercial or industrial settings, a complete environment, similar to that for other programming languages, must b...
John R. Graham, Daniel McHugh, Michael Mersic, Fos...
CSCW
2004
ACM
13 years 7 months ago
Ordering Systems: Coordinative Practices and Artifacts in Architectural Design and Planning
In their cooperative effort, architects depend critically on elaborate coordinative practices and artifacts. The article presents, on the basis of an in-depth study of architectura...
Kjeld Schmidt, Ina Wagner