Sciweavers

3516 search results - page 418 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SACMAT
2003
ACM
15 years 10 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
JSW
2008
98views more  JSW 2008»
15 years 4 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
WWW
2004
ACM
16 years 5 months ago
TCOZ approach to semantic web services design
Complex Semantic Web (SW) services may have intricate data state, autonomous process behavior and concurrent interactions. The design of such SW service systems requires precise a...
Jin Song Dong, Yuan-Fang Li, Hai H. Wang
TASLP
2002
84views more  TASLP 2002»
15 years 4 months ago
Substate tying with combined parameter training and reduction in tied-mixture HMM design
Two approaches are proposed for the design of tied-mixture hidden Markov models (TMHMM). One approach improves parameter sharing via partial tying of TMHMM states. To facilitate ty...
Liang Gu, Kenneth Rose
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 8 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...