Sciweavers

2178 search results - page 40 / 436
» Toward Systemically Secure IT Architectures
Sort
View
MOBIHOC
2005
ACM
14 years 7 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
ASPLOS
2006
ACM
14 years 1 months ago
SecCMP: a secure chip-multiprocessor architecture
Security has been considered as an important issue in processor design. Most of the existing mechanisms address security and integrity issues caused by untrusted main memory in si...
Li Yang, Lu Peng
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
14 years 1 months ago
Public Attitudes towards a National Identity "Smart Card: " Privacy and Security Concerns
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Brille
ISSTA
2006
ACM
14 years 1 months ago
Towards an architectural approach for the dynamic and automatic composition of software components
In a component-based software system the components are specified, designed and implemented with the intention to be reused, and are assembled in various contexts in order to pro...
Antonio Bucchiarone, Andrea Polini, Patrizio Pelli...
FAST
2009
13 years 5 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong