Sciweavers

5475 search results - page 131 / 1095
» Model Driven Security
Sort
View
130
Voted
FASE
2003
Springer
15 years 6 months ago
Model-Based Development of Web Applications Using Graphical Reaction Rules
Abstract. The OMG’s Model-Driven Architecture focusses on the evolution and integration of applications across heterogeneous middleware platforms. Presently available instances o...
Reiko Heckel, Marc Lohmann
123
Voted
AMS
2007
Springer
296views Robotics» more  AMS 2007»
15 years 7 months ago
Learning the Inverse Model of the Dynamics of a Robot Leg by Auto-imitation
Abstract Walking, running and hopping are based on self-stabilizing oscillatory activity. In contrast, aiming movements serve to direct a limb to a desired location and demand a qu...
Karl-Theodor Kalveram, André Seyfarth
83
Voted
JCS
2002
118views more  JCS 2002»
15 years 13 days ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
IJACT
2008
83views more  IJACT 2008»
15 years 23 days ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
83
Voted
FASE
2004
Springer
15 years 6 months ago
Actor-Centric Modeling of User Rights
Abstract. In this paper we present a novel approach for the predicative specification of user rights in the context of an object oriented use case driven development process. We e...
Ruth Breu, Gerhard Popp