Sciweavers

14331 search results - page 64 / 2867
» On the modeling and analysis of obligations
Sort
View
CSFW
1994
IEEE
15 years 6 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
CCGRID
2006
IEEE
15 years 8 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer
ISORC
2006
IEEE
15 years 8 months ago
From UML/SPT Models to Schedulability Analysis: a Metamodel-Based Transformation
UML through its profiling mechanism is well adapted for the modeling of real-time software requirements and designs. It is becoming the de facto standard. On the other hand, seve...
Abdelouahed Gherbi, Ferhat Khendek
ICDE
2012
IEEE
285views Database» more  ICDE 2012»
13 years 4 months ago
Multidimensional Analysis of Atypical Events in Cyber-Physical Data
— A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system tha...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Wen...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 4 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...