Sciweavers

2429 search results - page 137 / 486
» Using Aspects to Design a Secure System
Sort
View
ATAL
2005
Springer
14 years 2 months ago
Fencing the Open Fields: Empirical Concerns on Electronic Institutions (Invited Paper)
The regulation of multiagent systems may be approached from different stand-points. In this paper I will take the perspective of using a certain type of devices, electronic instit...
Pablo Noriega
AINA
2006
IEEE
14 years 29 days ago
Using Managed Communication Channels in Software Components
The paper discusses the potential usage of principles from General System Theory (GST) and Cybernetics for design of Autonomic Software. Motivated by the characteristics of open s...
Emil A. Stoyanov, Dieter Roller, Markus Alexander ...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 2 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
WISEC
2010
ACM
13 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
DAC
1997
ACM
14 years 1 months ago
Modeling Design Tasks and Tools: The Link Between Product and Flow Model
- The important step towards a comprehensive CAD framework is the development of a suitable, complete design model on which the design system’s components are based. To date, we ...
Bernd Schürmann, Joachim Altmeyer