Sciweavers

948 search results - page 106 / 190
» Analysis of SITA policies
Sort
View
ECIS
2003
15 years 1 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
TPDS
2010
143views more  TPDS 2010»
14 years 10 months ago
FIT: A Flexible, Lightweight, and Real-Time Scheduling System for Wireless Sensor Platforms
—We propose FIT, a flexible, lightweight, and real-time scheduling system for wireless sensor platforms. There are three salient features of FIT. First, its two-tier hierarchical...
Wei Dong, Chun Chen, Xue Liu, Kougen Zheng, Rui Ch...
CADE
2008
Springer
16 years 6 days ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
FOSAD
2009
Springer
15 years 6 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
PERSUASIVE
2009
Springer
15 years 6 months ago
Design methods for ethical persuasive computing
Value Sensitive Design and Participatory Design are two methodological frameworks that account for ethical issues throughout the process of technology design. Through analysis and...
Janet Davis