Sciweavers

3516 search results - page 471 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
FASE
2000
Springer
15 years 8 months ago
A Formal Approach to Heterogeneous Software Modeling
The problem of consistently engineering large, complex software systems of today is often addressed by introducing new, "improved" models. Examples of such models are arc...
Alexander Egyed, Nenad Medvidovic
WS
2005
ACM
15 years 10 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
SACMAT
2003
ACM
15 years 10 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
COMCOM
2006
121views more  COMCOM 2006»
15 years 4 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
129
Voted
ICIP
2005
IEEE
16 years 6 months ago
Game-theoretic analysis of a semi-fragile watermarking scheme based on SCS
Semi-fragile watermarking can be used to detect illegal and local manipulation of images, while being robust towards legal manipulations such as lossy compression. This paper desc...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...