Sciweavers

238 search results - page 36 / 48
» Security Control for COTS Components
Sort
View
87
Voted
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 1 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
WORDS
2003
IEEE
15 years 2 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
SMC
2010
IEEE
117views Control Systems» more  SMC 2010»
14 years 7 months ago
A simulation modelling approach enabling joint emergency response operations
—A novel capability for modelling and simulating intra- and inter-organizational collaboration in an emergencyresponse domain is presented. This capability combines the prescript...
Nicola Bicocchi, William Ross, Mihaela Ulieru
77
Voted
SACMAT
2009
ACM
15 years 4 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 1 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...