Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
The behaviour of control functions in safety critical software systems is typically bounded to prevent the occurrence of known system level hazards. These bounds are typically deri...
Zeshan Kurd, Tim Kelly, John A. McDermid, Radu Cal...
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Abstract-- Typical industrial assembly tasks require an accuracy that cannot be realized by only feedback control if a minimum speed is given by a conveyor. Feed-forward has proven...
Friedrich Lange, Johannes Scharrer, Gerd Hirzinger
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...