Sciweavers

674 search results - page 31 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
INFOCOM
2003
IEEE
15 years 2 months ago
Optimal Partition of QoS Requirements for Many-to-Many Connections
— We study problems related to supporting multicast connections with Quality of Service (QoS) requirements. We investigate the problem of optimal resource allocation in the conte...
Dean H. Lorenz, Ariel Orda, Danny Raz
MR
2007
157views Robotics» more  MR 2007»
14 years 9 months ago
Electronic prognostics - A case study using global positioning system (GPS)
– Prognostic health management (PHM) of electronic systems presents challenges traditionally viewed as either insurmountable or otherwise not worth the cost of pursuit. Recent ch...
Douglas W. Brown, Patrick W. Kalgren, Carl S. Byin...
IFIP
2009
Springer
15 years 4 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
76
Voted
DAGSTUHL
2006
14 years 11 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
SAC
2010
ACM
14 years 8 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme