Sciweavers

3516 search results - page 392 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
AGENTS
1998
Springer
15 years 9 months ago
A Synergy of Agent Components: Social Comparison for Failure Detection
of other components. This abstract presents an implemented illustration of such explicit component synergy and its usefulness in dynamic multi-agent environments. In such environme...
Gal A. Kaminka, Milind Tambe
CCS
2008
ACM
15 years 6 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
145
Voted
ETRICS
2006
15 years 8 months ago
Possibilistic Information Flow Control in MAKS and Action Refinement
Abstract. Formal methods emphasizes the need for a top-down approach when developing large reliable software systems. Refinements are map step by step abstract algebraic specificat...
Dieter Hutter
UTP
2010
15 years 2 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
CDC
2010
IEEE
131views Control Systems» more  CDC 2010»
14 years 8 months ago
State estimation of two-time scale multiple models with unmeasurable premise variables. Application to biological reactors
— This paper deals with the state estimation of nonlinear systems. The systems under study are characterized by two-time scale models. The state estimation is performed by design...
Anca Maria Nagy-Kiss, Benoît Marx, Gilles Mo...