Sciweavers

2429 search results - page 202 / 486
» Using Aspects to Design a Secure System
Sort
View
125
Voted
TASE
2007
IEEE
15 years 9 months ago
Realizing Live Sequence Charts in SystemVerilog
The design of an embedded control system starts with an investigation of properties and behaviors of the process evolving within its environment, and an analysis of the requiremen...
Hai H. Wang, Shengchao Qin, Jun Sun 0001, Jin Song...
142
Voted
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
15 years 9 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
126
Voted
ICDCS
1996
IEEE
15 years 7 months ago
An Evaluation of the Amoeba Group Communication System
The Amoeba group communication system has two unique aspects: (1) it uses a sequencer-based protocol with negative acknowledgements for achieving a total order on all group messag...
M. Frans Kaashoek, Andrew S. Tanenbaum
140
Voted
SIGADA
2004
Springer
15 years 8 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
109
Voted
SOUPS
2010
ACM
15 years 7 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell