Sciweavers

2337 search results - page 42 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
DAC
2009
ACM
13 years 5 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
CAISE
2003
Springer
14 years 26 days ago
A Methodology for Multilevel Database Design
Abstract. In a Connected Society, the importance of database privacy and security increases considerably. Security must be considered as a fundamental requirement in Information Sy...
Eduardo Fernández-Medina, Mario Piattini
WICSA
2008
13 years 9 months ago
Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory
Software modularization activities remain without the guidance of formal theories and models. According to Baldwin and Clark's [1] design rule theory (DRT) , modular architec...
Matthew J. LaMantia, Yuanfang Cai, Alan MacCormack...
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
14 years 1 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier
ANSOFT
2002
171views more  ANSOFT 2002»
13 years 7 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz