Safe and secure

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Safe and Secure Organic Computing Applications

In this paper we present our ongoing work on “Organic Computing”. We present an illustrative case study from program automation that uses OC-paradigms to be failure tolerant and to produce effectively. We present a way to build and verify a formal model of a self-adaptive system. We also give further ideas for formal modeling and our ideas of safety analysis of such systems. Another topic is ho...

متن کامل

Secure Safe Ambients and JVM Security

Safe Ambients are a variant of Cardelli and Gordon’s Mobile Ambients [CG98] proposed by Levi and Sangiorgi in [LS00]. The two calculi differ in the underlying notion of interaction: in Mobile Ambients interaction between ambients are “one-sided”, in that one of the two partners in a move or open action simply undergoes the action. In Safe ambients, instead, the reduction relation requires actio...

متن کامل

MultiMedia Instruction in Safe and Secure Systems

The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a curriculum in the area of Safe and Secure Systems. Traditional teaching materials (slides, handouts, annotated course material, assignments, and so on) are to be converted into a new hypermedia format, integrated with tool interactions for formally deve...

متن کامل

Secure Ad-hoc Pairing with Biometrics: SAfE

The pairing problem is to enable two devices, which share no prior context with each other, to agree upon a security association that they can use to protect their subsequent communication. Secure pairing should offer guarantees of the association partner’s identity and it should be resistant to eavesdropping or to a man-in the middle attack. We propose a user friendly solution to this problem....

متن کامل

Safe Authentication Protocol for Secure USB Memories

Due to its portability and accesibility, the USB memory has become one of the most popular storage devices. However, if the device is lost, stolen or hacked, it can lead to critical information leakage. It is natural that malicious insiders would try to thieve their colleagues’ USB memories. Consequently, various security-incorporated USB products have been developed. To our best knowledge, the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Thoracic and Cardiovascular Surgery

سال: 2018

ISSN: 0022-5223

DOI: 10.1016/j.jtcvs.2018.07.077