Sciweavers

2429 search results - page 85 / 486
» Using Aspects to Design a Secure System
Sort
View
JSA
1998
72views more  JSA 1998»
13 years 8 months ago
Network conscious design of distributed real-time systems
In this paper, we present a network conscious approach to designing distributed real-time systems. Given a task graph design of the system, the end-to-end constraints on the input...
Jung Woo Park, Young Shin Kim, Seongsoo Hong, Mana...
IEEEARES
2010
IEEE
14 years 3 months ago
Analysing and Visualising Security and Usability in IRIS
Abstract—Despite a long standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a ...
Shamal Faily, Ivan Flechais
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 1 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
DSN
2003
IEEE
14 years 2 months ago
The Design of Wearable Systems: A Shift in Development Effort
This paper describes a design process for custom wearable systems produced in an academic setting. A set of 245 wearable design defects from two distinct periods separated by six ...
John G. Dorsey, Daniel P. Siewiorek
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
Testing Design of a Social Innovation The Environmental Mitigation Banking System
This paper attempts to evaluate the performance of an environmental mitigation banking system operating under different regulatory. Pricing and subsidization policies using system...
Khalid Saeed, Atsushi Fukuda