Sciweavers

674 search results - page 40 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 3 months ago
Electronic Markets for Private Information: Economic and Security Considerations
Technological advances in the collection, storage and analysis of data have increased the ease with which businesses can make profitable use of information about individuals. Som...
Ram Gopal L., Robert S. Garfinkel, Manuel A. Nunez...
SAC
2010
ACM
15 years 4 months ago
Performance analysis of FlexRay-based systems using real-time calculus, revisited
The FlexRay protocol [4] is likely to be the de facto standard for automotive communication systems. Hence, there is a need to provide hard performance guarantees on properties li...
Devesh B. Chokshi, Purandar Bhaduri
126
Voted
IMCSIT
2010
14 years 4 months ago
Integration of Scheduling Analysis into UML Based Development Processes Through Model Transformation
The complexity of embedded systems and their safety requirements have risen significantly in recent years. Models and the model based development approach help to keep overview and...
Matthias Hagner, Ursula Goltz
67
Voted
DATE
2006
IEEE
125views Hardware» more  DATE 2006»
15 years 3 months ago
Combining simulation and formal methods for system-level performance analysis
Recent research on performance analysis for embedded systems shows a trend to formal compositional models and methods. These compositional methods can be used to determine the per...
Simon Künzli, Francesco Poletti, Luca Benini,...
ACSC
2007
IEEE
15 years 1 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...