Sciweavers

3516 search results - page 151 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
MOBIWAC
2009
ACM
15 years 9 months ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
129
Voted
SACMAT
2009
ACM
15 years 9 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
IFM
1999
Springer
15 years 7 months ago
Modelling Discrete Behaviour in a Continuous-Time Formalism
Embedded real-time systems consist of a digital controller interacting with its physical environment. Developing such systems therefore involves specifying and reasoning about bot...
Colin J. Fidge
106
Voted
POLICY
2005
Springer
15 years 8 months ago
Embedding Policy Rules for Software-Based Systems in a Requirements Context
Policy rules define what behavior is desired in a softwarebased system, they do not describe the corresponding action and event sequences that actually “produce” desired (“...
Mark Strembeck
131
Voted
FDL
2011
IEEE
14 years 3 months ago
Integrating system descriptions by clocked guarded actions
—For the description of reactive systems, there is a large number of languages and formalisms, and depending on a particular application or design phase, one of them may be bette...
Jens Brandt, Mike Gemunde, Klaus Schneider, Sandee...