Sciweavers

2337 search results - page 71 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
CODES
2005
IEEE
14 years 1 months ago
Power-smart system-on-chip architecture for embedded cryptosystems
In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...
ACSAC
2007
IEEE
13 years 11 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
ECIS
2003
13 years 9 months ago
Offshore information systems outsourcing: strategies and scenarios
This paper presents the findings of an ongoing research study into offshore information technology and systems outsourcing. Fieldwork was conducted in India and the United Kingdom...
Naureen Khan, Wendy Currie, Vishanth Weerakkody
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 7 months ago
LEXSYS: Architecture and Implication for Intelligent Agent systems
s LEXSYS, (Legume Expert System) was a project conceived at IITA (International Institute of Tropical Agriculture) Ibadan Nigeria. It was initiated by the COMBS (Collaborative Grou...
Charles A. B. Robert
WSC
2007
13 years 10 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...