نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

Journal: :Journal of Systems Architecture - Embedded Systems Design 2016
Lanfranco Lopriore

With reference to an embedded system featuring no support for memory management, we present a model of a protection system based on passwords and keys. At the hardware level, our model takes advantage of a memory protection unit (MPU) interposed between the processor and the complex of the main memory and the input-output devices. The MPU supports both concepts of a protection context and a pro...

Journal: :CoRR 2017
Aidin Ferdowsi Walid Saad Narayan B. Mandayam

Securing the physical components of a city’s interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and large number of involved sensors. Using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on ICI is studied in which the attacker first compromises the ICI’s s...

2011
Kenneth R. Thomas

The United States Constitution, as amended, is a complex legal document which sets out the structure of the federal government, the legal authorities of that government (and, to a lesser extent, state governments), and, finally, a series of legal disabilities on the exercise of those authorities (such as protections for individual rights). The document also addresses the complicated legal relat...

1998
María Ángeles Díaz Fondón Darío Álvarez Gutiérrez Lourdes Tajes Martínez Fernando Álvarez García Juan Manuel Cueva Lovelle

Protection is an essential issue for the kind of heterogeneous distributed interoperable object environments, which Java and CORBA are a glimpse of. A uniform protection mechanism such as capabilities, integrated with the object model of the system is a good and flexible solution for these environments. Oviedo3 is an example of an Integral Object-Oriented System (IOOS) based solely on the OO pa...

2016
Jens Knoop Uwe Zdun Krishna Narasimhan Christoph Reichenbach

Software evolves continuously. As software evolves, it’s code bases require implementations of new features. These new functionalities are sometimes mere extensions of existing functionalities with minor changes. A commonly used method of extending an existing feature into a similar new feature is to copy the existing feature and modify it. This method of extending feature is called “Copy-paste...

2001
Thierry Pun

Three major aspects in the protection of digital documents have been pointed out, each of them with di erent requirements: rst copyright protection, protecting ownership and usage rights; secondly tamper-proo ng, aiming at checking document integrity; and thirdly authentication, the purpose of which is to check the authenticity of a document. While robust watermarks are typically used for copyr...

2007
George Wilson Klaus Weidner

LinuxTM distributions have received numerous Common Criteria certifications in the last few years. Building on the recent Controlled Access Protection Profile (CAPP) certifications, an Open Source development effort to make Linux compliant with the Labeled Security Protection Profile (LSPP) and Role-Based Access Control Protection Profile (RBACPP) has been ongoing for almost two years. Developm...

2012
Danielle Carpenter Anna Färnert Ingegerd Rooth John A.L. Armour Marie-Anne Shaw

Copy number variation can contribute to the variation observed in susceptibility to complex diseases. Here we present the first study to investigate copy number variation of the chemokine gene CCL3L1 with susceptibility to malaria. We present a family-based genetic analysis of a Tanzanian population (n=922), using parasite load, mean number of clinical infections of malaria and haemoglobin leve...

Journal: :ComTech: Computer, Mathematics and Engineering Applications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید