Sciweavers

3516 search results - page 255 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ECMDAFA
2006
Springer
228views Hardware» more  ECMDAFA 2006»
15 years 7 months ago
Model Driven Development of Multi-Agent Systems
Abstract. Design patterns are templates of general solutions to commonlyoccurring problems in the analysis and design of software systems. In mature development processes, engineer...
Juan Pavón, Jorge J. Gómez-Sanz, Rub...
XMLSEC
2003
ACM
15 years 9 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
JCP
2008
116views more  JCP 2008»
15 years 3 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
ECRTS
2005
IEEE
15 years 9 months ago
Speed Modulation in Energy-Aware Real-Time Systems
This paper presents a general framework for analyzing and designing embedded systems with energy and timing requirements. A set of realistic assumptions is considered in the model...
Enrico Bini, Giorgio C. Buttazzo, Giuseppe Lipari
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 9 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...