Sciweavers

2337 search results - page 72 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
KES
2008
Springer
13 years 7 months ago
EasyLife: A Location-Aware Service Oriented Mobile Information System
Many examples of Location-aware services have been developed in recent years as the enabling technologies mature. However, these services frequently exist in isolation and address ...
J. M. Shen, Michael J. O'Grady, Gregory M. P. O'Ha...
AISS
2010
165views more  AISS 2010»
13 years 5 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
NCA
2005
IEEE
14 years 1 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 1 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
14 years 2 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang