Sciweavers

109 search results - page 10 / 22
» Trends in Security Product Evaluations
Sort
View
CAISE
2008
Springer
13 years 9 months ago
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
Patrik Spieß, Dinh Khoa Nguyen, Ingo Weber, ...
DATE
1997
IEEE
75views Hardware» more  DATE 1997»
13 years 11 months ago
Random benchmark circuits with controlled attributes
Two major improvements, controlled fan-in and automated initial-circuit production, were made over the random generator of benchmark circuits presented at DAC'94. This is an ...
Kazuo Iwama, Kensuke Hino, Hiroyuki Kurokawa, Suna...
SAFECOMP
2007
Springer
14 years 1 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
CODASPY
2012
12 years 3 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
IEEEARES
2006
IEEE
14 years 1 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...