Sciweavers

3516 search results - page 195 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 9 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
BIOID
2008
101views Biometrics» more  BIOID 2008»
15 years 5 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
RIDE
1993
IEEE
15 years 7 months ago
Integration of Relational Databases in a Multidatabase System based on Schema Enrichment
In this paper, we describe a framework for an object-oriented modeling of meta information and its use for the integration of heterogeneous databases with the goal of their intero...
Daniel A. Keim, Hans-Peter Kriegel, Andreas Mieths...
133
Voted
SACMAT
2009
ACM
15 years 10 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
163
Voted
EMSOFT
2003
Springer
15 years 8 months ago
Constraint-Based Design-Space Exploration and Model Synthesis
An important bottleneck in model-based design of embedded systems is the cost of constructing models. This cost can be significantly decreased by increasing the reuse of existing m...
Sandeep Neema, Janos Sztipanovits, Gabor Karsai, K...