Sciweavers

2429 search results - page 73 / 486
» Using Aspects to Design a Secure System
Sort
View
INDOCRYPT
2004
Springer
14 years 2 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
SASN
2005
ACM
14 years 2 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu
IEEEARES
2007
IEEE
14 years 3 months ago
Models for automatic generation of safety-critical real-time systems
Model-based development has become state of the art in software engineering. A number of tools, like Matlab/Simulink or SCADE, are available for the automatic generation of applic...
Christian Buckl, Matthias Regensburger, Alois Knol...
USENIX
2003
13 years 10 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
SOCO
2010
Springer
13 years 7 months ago
Visualizing and Assessing a Compositional Approach of Business Process Design
Abstract. In the context of Services Oriented Architecture (Soa), complex systems are realized through the design of business–driven processes. Since the design of a complete pro...
Sébastien Mosser, Alexandre Bergel, Mireill...