Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer
systems. Using caches as a side channel, these attacks are able to derive secret keys used …
systems. Using caches as a side channel, these attacks are able to derive secret keys used …
Data usage and access control in industrial data spaces: Implementation using FIWARE
In recent years, a new business paradigm has emerged which revolves around effectively
extracting value from data. In this scope, providing a secure ecosystem for data sharing that …
extracting value from data. In this scope, providing a secure ecosystem for data sharing that …
Boosting a low-cost smart home environment with usage and access control rules
Smart Home has gained widespread attention due to its flexible integration into everyday
life. Pervasive sensing technologies are used to recognize and track the activities that …
life. Pervasive sensing technologies are used to recognize and track the activities that …
Monitoring of business process execution based on performance indicators
Nowadays, more and more industrial organizations are using Business Process Model and
Notation (BPMN) for process modeling. Key performance Indicators (KPIs) are seton such …
Notation (BPMN) for process modeling. Key performance Indicators (KPIs) are seton such …
[HTML][HTML] An avatar cloud service based method for supervising and interacting with containerized applications
This paper presents Davatar, an information processing and management method for
building digital avatars for existing cloud services. A digital avatar is an abstract and intuitive …
building digital avatars for existing cloud services. A digital avatar is an abstract and intuitive …
An ontology-based solution for monitoring iot cybersecurity
Abstract Context: Systems of Systems (SoSs) are becoming an emerging architecture, and
they are used in several daily life contexts. Objective: The aim is to define a reference …
they are used in several daily life contexts. Objective: The aim is to define a reference …
[PDF][PDF] Towards Monitoring Cloud Services using Models@ run. time.
Cloud computing represents a new trend to provide software services. In order to deliver
these services there are certain quality levels that should be considered. The provided …
these services there are certain quality levels that should be considered. The provided …
Delay-fault testing and defects in deep sub-micron ICs-does critical resistance really mean anything?
W Moore, G Gronthoud, K Baker… - … Test Conference 2000 …, 2000 - ieeexplore.ieee.org
This paper reflects on some recent results that show the value of delay-fault tests on a deep
sub-micron process. However, the results also suggest that untargetted test patterns perform …
sub-micron process. However, the results also suggest that untargetted test patterns perform …
[PDF][PDF] MENTORS: Monitoring Environment for System of Systems.
Context: Systems Of Systems (SoSs) are becoming a widespread emerging architecture,
and they are used in several daily life contexts. Therefore, when a new device is integrated …
and they are used in several daily life contexts. Therefore, when a new device is integrated …
A middleware for reflective web service choreographies on the cloud
Web service composition is a commonly used solution to build distributed systems on the
cloud. Choreographies are one specific kind of service composition in which the …
cloud. Choreographies are one specific kind of service composition in which the …