Sciweavers

3516 search results - page 432 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ECBS
2006
IEEE
122views Hardware» more  ECBS 2006»
15 years 10 months ago
Customer-oriented Development of Complex Distributed Systems
Complex and distributed systems are more and more common. Hardware is going from strength to strength and is embedded in high performance peer-to-peer networks mostly. The task of...
Ivonne Erfurth
SACMAT
2006
ACM
15 years 10 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
AICCSA
2001
IEEE
131views Hardware» more  AICCSA 2001»
15 years 8 months ago
Modeling Resources in a UML-Based Simulative Environment
The importance of early performance assessment grows as software systems increase in terms of size, logical distribution and interaction complexity. Lack of time from the side of ...
Hany H. Ammar, Vittorio Cortellessa, Alaa Ibrahim
SACMAT
2005
ACM
15 years 10 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
JUCS
2008
127views more  JUCS 2008»
15 years 4 months ago
A Spiral Model for Adding Automatic, Adaptive Authoring to Adaptive Hypermedia
: At present a large amount of research exists into the design and implementation of adaptive systems. However, not many target the complex task of authoring in such systems, or th...
Maurice Hendrix, Alexandra I. Cristea