Sciweavers

24 search results - page 2 / 5
» A model-based approach to integrating security policies for ...
Sort
View
TODAES
2008
158views more  TODAES 2008»
13 years 5 months ago
Designing secure systems on reconfigurable hardware
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integ...
Ted Huffmire, Brett Brotherton, Nick Callegari, Jo...
AINA
2006
IEEE
13 years 11 months ago
Model-based Management of Embedded Service Systems - An Applied Approach
The automatic integration of devices into dynamic, automatically configured networks alone does not take advantage of the entire potential of Service Oriented Architectures (SOA)...
Stefan Illner, Heiko Krumm, Ingo Lück, Andre ...
WORDS
2005
IEEE
13 years 11 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
AINA
2011
IEEE
12 years 9 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
CIMCA
2006
IEEE
13 years 11 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet