Sciweavers

87 search results - page 2 / 18
» Modeling System Security Rules with Time Constraints Using T...
Sort
View
VALUETOOLS
2006
ACM
162views Hardware» more  VALUETOOLS 2006»
13 years 11 months ago
Using UML state machines and petri nets for the quantitative investigation of ETCS
This paper proposes the modeling of technical systems and their behavior by means of Unified Modeling Language (UML) State Machines and the extending UML Profile for Schedulabil...
Jan Trowitzsch, Armin Zimmermann
ECRTS
2000
IEEE
13 years 10 months ago
Prototyping distributed multimedia systems using communicating real-time state machines
This paper describes a methodology for the development of real-time systems and shows its application to the modeling, analysis and implementation of distributed multimedia system...
Giancarlo Fortino, Libero Nigro
SACMAT
2009
ACM
14 years 7 days ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ETRICS
2006
13 years 9 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
ISSTA
1998
ACM
13 years 9 months ago
Improving Efficiency of Symbolic Model Checking for State-Based System Requirements
We present various techniques for improving the time and space efficiency of symbolic model checking for system requirements specified as synchronous finite state machines. We use...
William Chan, Richard J. Anderson, Paul Beame, Dav...