Sciweavers

851 search results - page 111 / 171
» A Framework of Syntactic Models for the Implementation of Vi...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 2 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 1 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
FASE
2010
Springer
14 years 2 months ago
Reusing Model Transformations While Preserving Properties
Abstract. Model transformations are indispensable to model-based development (MBD) where they act as translators between domain-specific languages (DSLs). As a result, transformat...
Ethan K. Jackson, Wolfram Schulte, Daniel Balasubr...
EDOC
2007
IEEE
14 years 2 months ago
Model-Driven Engineering for Requirements Analysis
Requirements engineering (RE) encompasses a set of activities for eliciting, modelling, agreeing, communicating and validating requirements that precisely define the problem doma...
Benoit Baudry, Clémentine Nebut, Yves Le Tr...
ICLP
2003
Springer
14 years 28 days ago
On Deterministic Computations in the Extended Andorra Model
Logic programming is based on the idea that computation is controlled inference. The Extended Andorra Model provides a very powerful framework that supports both co-routining and p...
Ricardo Lopes, Vítor Santos Costa, Fernando...