Sciweavers

2178 search results - page 295 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CCS
2004
ACM
14 years 1 months ago
On the effectiveness of address-space randomization
Address-space randomization is a technique used to fortify systems against bu er over ow attacks. The idea is to introduce arti cial diversity by randomizing the memory location o...
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh...
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
14 years 2 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
ISI
2007
Springer
13 years 8 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
MEDES
2009
ACM
14 years 2 months ago
Integrated service engineering workbench: service engineering for digital ecosystems
The evolution of service-oriented architectures towards digital ecosystems comprehends a number of challenges. According to Papazoglou et al., one challenge is to develop services...
Gregor Scheithauer, Konrad Voigt, Veli Bicer, Matt...
DATE
2006
IEEE
91views Hardware» more  DATE 2006»
14 years 2 months ago
Is "Network" the next "Big Idea" in design?
As the complexity of nowadays systems continues to grow, we are moving away from creating individual components from scratch, toward methodologies that emphasize composition of re...
Radu Marculescu, Jan M. Rabaey, Alberto L. Sangiov...