Sciweavers

5475 search results - page 13 / 1095
» Model Driven Security
Sort
View
99
Voted
MSWIM
2006
ACM
15 years 6 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
89
Voted
SAFECOMP
2001
Springer
15 years 4 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...
92
Voted
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
15 years 4 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...
68
Voted
ACSAC
2000
IEEE
15 years 4 months ago
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
103
Voted
SE
2007
15 years 1 months ago
PDD applied: A model driven approach
: Property Driven Development is a methodology to check the validity of a distributed application and its conformance to specified requirements. A first prototype supporting this...
Helge Sören Klimek