Sciweavers

674 search results - page 62 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
SAFECOMP
1998
Springer
15 years 6 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
TVLSI
2008
139views more  TVLSI 2008»
15 years 1 months ago
Ternary CAM Power and Delay Model: Extensions and Uses
Applications in computer networks often require high throughput access to large data structures for lookup and classification. While advanced algorithms exist to speed these search...
Banit Agrawal, Timothy Sherwood
123
Voted
TIFS
2008
149views more  TIFS 2008»
15 years 1 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
CDC
2008
IEEE
144views Control Systems» more  CDC 2008»
15 years 8 months ago
Control software model checking using bisimulation functions for nonlinear systems
— This paper extends a method for integrating source-code model checking with dynamic system analysis to verify properties of controllers for nonlinear dynamic systems. Source-co...
James Kapinski, Alexandre Donzé, Flavio Ler...
SERP
2010
14 years 11 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight