Sciweavers

294 search results - page 46 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
APSEC
2008
IEEE
15 years 6 months ago
Behavioral Specification of Real-Time Requirements
This paper aims to present a systematic method to: (1) specify high-level and event based real-time requirements and (2) map the specified requirements to low-level and state-base...
Seyed Morteza Babamir, Faezeh Sadat Babamir
POLICY
2004
Springer
15 years 5 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
JMS
2007
151views more  JMS 2007»
14 years 11 months ago
Wireless Body Sensor Network Using Medical Implant Band
A wireless body sensor network hardware has been designed and implemented based on MICS (Medical Implant Communication Service) band. The MICS band offers the advantage of miniatur...
Mehmet R. Yuce, Steven W. P. Ng, Naung L. Myo, Jam...
IPPS
2002
IEEE
15 years 4 months ago
A Framework for Network Management Using Mobile Agents
Conventional network management is based on SNMP and often run in a centralized manner. Although the centralized management approach gives network administrators a flexibility of ...
Manoj Kumar Kona, Cheng-Zhong Xu
ICWS
2008
IEEE
15 years 1 months ago
Dynamic Exception Handling Based on Web Services and OPC XML-DA
Programmable Logic Controllers (PLC) are widely used in process automation due to their fast and guarantee response time. However their programming and interfacing capacities are ...
Francisco Javier Díez, Iñaki Maurtua