Sciweavers

861 search results - page 24 / 173
» Internal implementation
Sort
View
NOMS
2000
IEEE
15 years 2 months ago
POWER prototype: towards integrated policy-based management
ot only high level description of abstract policy, but also enables such policy to be refined and eventually mapped into an appropriate configuration for controlling devices in the...
Marco Casassa Mont, Adrian Baldwin, Cheh Goh
64
Voted
FAC
2008
88views more  FAC 2008»
14 years 9 months ago
The certification of the Mondex electronic purse to ITSEC Level E6
Ten years ago the Mondex electronic purse was certified to ITSEC Level E6, the highest level of assuranceforsecuresystems.ThisinvolvedbuildingformalmodelsintheZnotation,linkingthem...
Jim Woodcock, Susan Stepney, David Cooper, John A....
65
Voted
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
15 years 10 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
75
Voted
GI
2009
Springer
15 years 2 months ago
Activity Recognition using Optical Sensors on Mobile Phones
: Each mobile phone with a built-in CMOS sensor can inherently be seen as sophisticated optical sensor being able to analyze its environment in terms of visual events and its own m...
Michael Wittke, Uwe Jänen, Aret Duraslan, Emr...
196
Voted
FM
2011
Springer
357views Formal Methods» more  FM 2011»
14 years 1 months ago
TraceContract: A Scala DSL for Trace Analysis
Abstract. In this paper we describe TRACECONTRACT, an API for trace analysis, implemented in the SCALA programming language. We argue that for certain forms of trace analysis the b...
Howard Barringer, Klaus Havelund