Sciweavers

29 search results - page 1 / 6
» Embedding Policy Rules for Software-Based Systems in a Requi...
Sort
View
POLICY
2005
Springer
13 years 10 months ago
Embedding Policy Rules for Software-Based Systems in a Requirements Context
Policy rules define what behavior is desired in a softwarebased system, they do not describe the corresponding action and event sequences that actually “produce” desired (“...
Mark Strembeck
ICESS
2004
Springer
13 years 10 months ago
Selecting a Scheduling Policy for Embedded Real-Time Monitor and Control Systems
An integrated solution to guarantee real-time requirements in embedded real-time monitor and control systems is presented in this paper. First l task model is abstracted from such ...
Qingxu Deng, Mingsong Lv, Ge Yu
CCS
2009
ACM
14 years 5 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
SGAI
2007
Springer
13 years 11 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
DELTA
2008
IEEE
13 years 11 months ago
Improved Policies for Drowsy Caches in Embedded Processors
In the design of embedded systems, especially batterypowered systems, it is important to reduce energy consumption. Cache are now used not only in general-purpose processors but a...
Junpei Zushi, Gang Zeng, Hiroyuki Tomiyama, Hiroak...