Sciweavers

3516 search results - page 355 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
134
Voted
HOTOS
2009
IEEE
15 years 8 months ago
Simplifying Distributed System Development
Distributed systems are difficult to design and develop. The difficulties arise both in basic safety correctness properties, and in achieving high performance. As a result of this...
Maysam Yabandeh, Nedeljko Vasic, Dejan Kostic, Vik...
WOSP
2010
ACM
15 years 8 months ago
A framework for utility-based service oriented design in SASSY
The architecture of a software system has a significant impact on its quality of service (QoS) as measured by several performance metrics such as execution time, availability, th...
Daniel A. Menascé, John M. Ewing, Hassan Go...
SACMAT
2009
ACM
15 years 9 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
CCS
2010
ACM
15 years 2 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
DATE
2006
IEEE
91views Hardware» more  DATE 2006»
15 years 10 months ago
How OEMs and suppliers can face the network integration challenges
Systems integration is a major challenge in many industries. Systematic analysis of the complex integration effects, especially with respect to timing and performance, significant...
Kai Richter, Rolf Ernst