Sciweavers

262 search results - page 17 / 53
» Providing Trusted Components to the Industry
Sort
View
FGCS
2010
99views more  FGCS 2010»
14 years 8 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein
SIGADA
2005
Springer
15 years 2 months ago
The affordable application of formal methods to software engineering
The purpose of this research paper is to examine (1) why formal methods are required for software systems today; (2) the Praxis High Integrity Systems’ Correctness-by-Constructi...
James F. Davis
CSREASAM
2003
14 years 10 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
49
Voted
ROMAN
2007
IEEE
133views Robotics» more  ROMAN 2007»
15 years 3 months ago
Interacting with a Robot Ecology using Task Templates
Abstract— Robot ecologies provide a new paradigm for assistive, service, industrial, and entertainment robotics which is quickly gaining popularity. These ecologies contain a lar...
Mathias Broxvall, Amy Loutfi, Alessandro Saffiotti
LISA
2001
14 years 10 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett