Sciweavers

981 search results - page 129 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
WORDS
2005
IEEE
15 years 7 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
JUCS
2010
186views more  JUCS 2010»
14 years 12 months ago
Context Awareness for Collaborative Learning with Uncertainty Management
: In Collaborative Learning, groups of students work together using traditional and computer-based tools or applications. Participants are continuously moving and reorganizing in g...
Roc Messeguer, Leandro Navarro, Pedro Damiá...
ATAL
2010
Springer
15 years 2 months ago
Agent-based micro-storage management for the Smart Grid
The use of energy storage devices in homes has been advocated as one of the main ways of saving energy and reducing the reliance on fossil fuels in the future Smart Grid. However,...
Perukrishnen Vytelingum, Thomas Voice, Sarvapali D...
POPL
1998
ACM
15 years 5 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
CCS
2010
ACM
15 years 2 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...