Sciweavers

1297 search results - page 186 / 260
» Control of systems integrating logic, dynamics, and constrai...
Sort
View
ICTCS
2005
Springer
15 years 7 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
IEEEARES
2010
IEEE
15 years 6 months ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
SOFTCOMP
2010
14 years 11 months ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...
AINA
2007
IEEE
15 years 7 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...
BMCBI
2006
126views more  BMCBI 2006»
15 years 1 months ago
A joint model of regulatory and metabolic networks
Background: Gene regulation and metabolic reactions are two primary activities of life. Although many works have been dedicated to study each system, the coupling between them is ...
Chen-Hsiang Yeang, Martin Vingron