Sciweavers

2178 search results - page 153 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CASES
2006
ACM
14 years 1 months ago
State space reconfigurability: an implementation architecture for self modifying finite automata
Many embedded systems exhibit temporally and behaviorally disjoint behavior slices. When such behaviors are captured by state machines, the current design flow will capture it as ...
Ka-Ming Keung, Akhilesh Tyagi
ECUMN
2007
Springer
14 years 3 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
ESORICS
2009
Springer
14 years 10 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
BIRTHDAY
2004
Springer
14 years 1 months ago
Basic LMS Architecture for Learner-Centric LearnFlows or How Reusable Learning Objects Fit into Co-Constructivist Learning Proce
The discussions about learning management systems and reusable learning objects primarily focus on technical standardization issues. Standards such as SCORM or LTSC-LOM will yield...
Wolfgang F. Finke
HOTOS
2003
IEEE
14 years 2 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...