Sciweavers

3516 search results - page 433 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
MOBISYS
2007
ACM
16 years 4 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
ICFEM
2010
Springer
15 years 3 months ago
Dynamic Resource Reallocation between Deployment Components
Abstract. Today’s software systems are becoming increasingly configurable and designed for deployment on a plethora of architectures, ranging from sequential machines via multic...
Einar Broch Johnsen, Olaf Owe, Rudolf Schlatte, Si...
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 10 months ago
Evaluating PACS Success: A Multidimensional Model
A picture archiving and communications system (PACS) is an integrated workflow system for managing images and related data which is designed to streamline operations throughout th...
Guy Paré, David Aubry, Luigi Lepanto, Claud...
DALT
2004
Springer
15 years 8 months ago
Modeling and Verification of Distributed Autonomous Agents Using Logic Programming
Systems of autonomous agents providing automated services over the Web are fast becoming a reality. Often these agent systems are constructed using procedural architectures that pr...
L. Robert Pokorny, C. R. Ramakrishnan