Sciweavers

3516 search results - page 172 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
134
Voted
EDUTAINMENT
2007
Springer
15 years 9 months ago
UML in Action: Integrating Formal Methods in Industrial Design Education
When designing product behavior, the designer often needs to communicate to experts in computer software and protocols. In present-day software engineering, formal specification m...
Jun Hu, Philip Ross, Loe M. G. Feijs, Yuechen Qian
WORDS
2005
IEEE
15 years 9 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
INFOVIS
2005
IEEE
15 years 9 months ago
Visualizing Coordination In Situ
Exploratory visualization environments allow users to build and browse coordinated multiview visualizations interactively. As the number of views and amount of coordination increa...
Chris Weaver
181
Voted
ECUMN
2007
Springer
15 years 9 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
JAR
2008
115views more  JAR 2008»
15 years 3 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...