Sciweavers

181 search results - page 21 / 37
» A Case Study in Access Control Requirements for a Health Inf...
Sort
View
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
IFIP13
2004
13 years 9 months ago
Designing Distributed Task Performance in Safety-Critical Systems Equipped With Mobile Devices
: This paper describes a method aiming to support the design of interactive-safety critical systems. The method proposes an original integration of approaches usually considered se...
Ana-Maria Marhan, Fabio Paternò, Carmen San...
ENTCS
2002
107views more  ENTCS 2002»
13 years 7 months ago
Monitoring, Checking, and Steering of Real-Time Systems
The MaC system has been developed to provide assurance that a target program is running correctly with respect to formal requirements specification. This is achieved by monitoring...
Moonjoo Kim, Insup Lee, Usa Sammapun, Jangwoo Shin...
NSDI
2010
13 years 9 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
DEON
2010
Springer
14 years 15 days ago
Value-Based Argumentation for Justifying Compliance
Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures . This system-based control requires a new appro...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan