Sciweavers

83 search results - page 8 / 17
» Model-based assurance of security controls
Sort
View
MMMACNS
2005
Springer
15 years 3 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
SAFECOMP
2009
Springer
15 years 4 months ago
Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control
The behaviour of control functions in safety critical software systems is typically bounded to prevent the occurrence of known system level hazards. These bounds are typically deri...
Zeshan Kurd, Tim Kelly, John A. McDermid, Radu Cal...
ESOP
2005
Springer
15 years 3 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
ICRA
2010
IEEE
188views Robotics» more  ICRA 2010»
14 years 8 months ago
Classification and prediction for accurate sensor-based assembly to moving objects
Abstract-- Typical industrial assembly tasks require an accuracy that cannot be realized by only feedback control if a minimum speed is given by a conveyor. Feed-forward has proven...
Friedrich Lange, Johannes Scharrer, Gerd Hirzinger
ACSAC
2001
IEEE
15 years 2 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...