Sciweavers

3516 search results - page 201 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
121
Voted
ATAL
2005
Springer
15 years 9 months ago
A secure architectural description language for agent systems
Multi-agent systems are now being considered a promising architectural approach for building Internet-based applications. One of the most critical and important aspects of softwar...
Haralambos Mouratidis, Manuel Kolp, Stéphan...
152
Voted
BIRTHDAY
2003
Springer
15 years 8 months ago
Spatial Data Management for Virtual Product Development
Abstract: In the automotive and aerospace industry, millions of technical documents are generated during the development of complex engineering products. Particularly, the universa...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
128
Voted
RAID
2010
Springer
15 years 1 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh
151
Voted
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
15 years 4 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
104
Voted
CCS
2007
ACM
15 years 9 months ago
Administration in role-based access control
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify s...
Ninghui Li, Ziqing Mao