Sciweavers

1081 search results - page 70 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
HICSS
2003
IEEE
109views Biometrics» more  HICSS 2003»
14 years 2 months ago
Towards a Structurational Theory of Information Systems: A Substantive Case Analysis
This paper employs the analysis of an interpretive case study within a Regional Train Operating Company (RTOC) to arrive at theoretical understandings of Information Systems (IS)....
Jeremy Rose, Ray Hackney
TC
2008
13 years 8 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
ICONS
2009
IEEE
14 years 3 months ago
Ontology-Based Decision Support for Information Security Risk Management
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
AUSAI
2003
Springer
14 years 2 months ago
Towards Automated Creation of Image Interpretation Systems
Abstract. Automated image interpretation is an important task in numerous applications ranging from security systems to natural resource inventorization based on remote-sensing. Re...
Ilya Levner, Vadim Bulitko, Lihong Li, Greg Lee, R...
ICCSA
2009
Springer
14 years 3 months ago
Towards Location-Based Real-Time Monitoring Systems in u-LBS
Recently, ubiquitous location-based services (u-LBS) has been utilized in a variety of practical and mission-critical applications such as security services, personalization servic...
MoonBae Song, Hyunseung Choo