Sciweavers

3555 search results - page 556 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CCS
2008
ACM
15 years 6 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
SEC
2004
15 years 5 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
IROS
2006
IEEE
163views Robotics» more  IROS 2006»
15 years 10 months ago
Robotic On-Orbit Servicing - DLR's Experience and Perspective
The increasing number of launched satellites per year, calls for solutions to keep free operational space for telecommunication systems in geo-synchronized orbit, as well as to av...
Klaus Landzettel, Carsten Preusche, Alin Albu-Sch&...
CAISE
2004
Springer
15 years 9 months ago
MT-Flow - An Environment for Workflow-Supported Model Transformations in MDA
Abstract. Specification of systems in a software product line (product-line members) is often supported by domain-specific languages (DSLs) that provide pownguage abstractions for ...
Jernej Kovse, Theo Härder
176
Voted
BMCBI
2011
14 years 7 months ago
PRIN, a predicted rice interactome network
Background: Protein-protein interactions play a fundamental role in elucidating the molecular mechanisms of biomolecular function, signal transductions and metabolic pathways of l...
Haibin Gu, Pengcheng Zhu, Yinming Jiao, Yijun Meng...