Sciweavers

653 search results - page 78 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
MA
2000
Springer
135views Communications» more  MA 2000»
14 years 20 days ago
Principles of Mobile Maude
Mobile Maude is a mobile agent language extending the rewriting logic language Maude and supporting mobile computation. Mobile Maude uses reflection to obtain a simple and general ...
Francisco Durán, Steven Eker, Patrick Linco...
ISCC
2005
IEEE
14 years 2 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
EUSFLAT
2001
101views Fuzzy Logic» more  EUSFLAT 2001»
13 years 10 months ago
Fuzzy logic in organization analysis and control
This work points out advantages for the application of fuzzy logic in organization analysis and control. From the presented motivations we propose both a managerial control cycle ...
Farley S. M. Nobre, Simon J. Steiner
CRITIS
2007
13 years 10 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
ISLPED
1995
ACM
131views Hardware» more  ISLPED 1995»
14 years 19 days ago
Guarded evaluation: pushing power management to logic synthesis/design
The need to reduce the power consumption of the next generation of digital systems is clearly recognized. At the system level, power management is a very powerful technique and de...
Vivek Tiwari, Sharad Malik, Pranav Ashar