Sciweavers

5475 search results - page 171 / 1095
» Model Driven Security
Sort
View
132
Voted
ISORC
2007
IEEE
15 years 9 months ago
Time-Predictable Task Preemption for Real-Time Systems with Direct-Mapped Instruction Cache
Modern processors used in embedded systems are becoming increasingly powerful, having features like caches and pipelines to speedup execution. While execution speed of embedded so...
Raimund Kirner, Peter P. Puschner
114
Voted
EDOC
2006
IEEE
15 years 9 months ago
Workshop on ODP for Enterprise Computing (WODPEC 2006)
The RM-ODP standard still provides the only comprehensive and coherent framework of concepts for the specification of complex large scale IT systems, and has taken on a new signif...
João Paulo A. Almeida, Peter F. Linington, ...
147
Voted
UML
2005
Springer
15 years 9 months ago
Composing Domain-Specific Languages for Wide-Scope Software Engineering Applications
Abstract. Domain-Specific Languages (DSL) offer many advantages over general languages, but their narrow scope makes them really effective only in very focused domains, for example...
Jacky Estublier, Germán Vega, Anca Daniela ...
104
Voted
PERCOM
2006
ACM
16 years 3 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
120
Voted
ITCC
2005
IEEE
15 years 9 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset