Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Parkinson, Simon; Longstaff, Andrew P.; Crampton, Andrew; Allen, Gary; Fletcher, Simon; Myers, Alan
Languages: English
Types: Unknown
Subjects: T1
Typically the design and production of metrology software is based upon a rigorous process of establishing the software requirements. Both the metrology and security requirements will be processed and normally evaluated in isolation, or at best simultaneously. With the use of cryptographic principles, and the more prominent object-oriented programming languages, a new security-centric philosophy to metrology software design and production is presented to provide secure, robust and functional metrology software.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • BS, Measurement management systems - Requirements for measurement processes and measuring equipment. 2003, BSI: London, United Kingdom.
    • Renishaw. System software for QC20-W ballbar. 2011 [cited 2011; Available from: http://www.renishaw.com/en/system-software-forqc20-w-ballbar--11076 G. Norbert, S. Heike, R. Dieter, Software validation in metrology: A case study for a GUM-supporting software. Measurement, 2006. 39(9): p. 849-855.
    • B.Wichmann, G. Parkin, R. Barker, Software Support for Metrology Best Practice Guide No. 1, in Validation of Software in Measurement Systems. 2007, National Physical Laboratory.
    • R. M. Barker., Software Support for Metrology Best Practice Guide No. 19, in Internet-enabled Metrology Systems. 2006, National Physical Laboratory Å. Sand, H. Slinde, T. A. Fjeldly, A Secure Approach to Distributed Internet-Enabled Metrology. IEEE Transactions on Instrumentation and Measurement, 2007. 56(5): p. 1979 - 1985 IEEE, Standard Specifications for Public-Key Cryptography. 2000, IEEE.
    • D. S. A. Elminaam, H. M. A. Kader, M. M. Hadhoud, Evaluating The Performance of Symmetric Encryption Algorithms. International Journal of Network Security, 2010. 10(3): p. 213-219.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article