Sciweavers

981 search results - page 98 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
EMSOFT
2004
Springer
15 years 7 months ago
Making mechatronic agents resource-aware in order to enable safe dynamic resource allocation
Mechatronic systems are embedded software systems with hard real-time requirements. Predictability is of paramount importance for these systems. Thus, their design has to take the...
Sven Burmester, Matthias Gehrke, Holger Giese, Sim...
DBSEC
2010
152views Database» more  DBSEC 2010»
15 years 3 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
15 years 3 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
VLC
2008
146views more  VLC 2008»
15 years 1 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro
IAT
2010
IEEE
14 years 11 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski