Sciweavers

12670 search results - page 186 / 2534
» Requirements Modeling
Sort
View
110
Voted
ICFEM
2007
Springer
15 years 9 months ago
Machine-Assisted Proof Support for Validation Beyond Simulink
Simulink is popular in industry for modeling and simulating embedded systems. It is deficient to handle requirements of high-level assurance and timing analysis. Previously, we sh...
Chunqing Chen, Jin Song Dong, Jun Sun 0001
109
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
184
Voted
IPCCC
2007
IEEE
15 years 10 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
141
Voted
IJMMS
2007
142views more  IJMMS 2007»
15 years 3 months ago
Using OWL to model biological knowledge
Much has been written of the facilities for ontology building and reasoning offered for ontologies expressed in the Web Ontology Language (OWL). Less has been written about how th...
Robert Stevens, Mikel Egaña Aranguren, Katy...
124
Voted
WISA
2007
Springer
15 years 9 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang