Sciweavers

2178 search results - page 145 / 436
» Toward Systemically Secure IT Architectures
Sort
View
IMCS
2007
77views more  IMCS 2007»
13 years 9 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
14 years 4 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...
SAC
2010
ACM
14 years 4 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 28 days ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ICAS
2009
IEEE
141views Robotics» more  ICAS 2009»
14 years 4 months ago
An Enhanced IMS Architecture Featuring Cross-Layer Monitoring and Adaptation Mechanisms
IP Multimedia Subsystem (IMS) entails novel business opportunities for pioneering and emerging multimedia services, such as IPTV and VoIP video call applications. However, this st...
Lemonia Boula, Harilaos Koumaras, Anastasios Kourt...