Sciweavers

597 search results - page 49 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
ATAL
2003
Springer
15 years 7 months ago
Modifying agent systems for an open, dynamic agent environment
Most agent systems today are closed and static. That is, one uses Agent-Oriented Software Engineering techniques to build agent systems in which the set of agents is specified ahe...
Adam L. Berger, Robert R. Kessler
144
Voted
ISOLA
2010
Springer
15 years 1 months ago
Enforcing Applicability of Real-Time Scheduling Theory Feasibility Tests with the Use of Design-Patterns
Abstract. This article deals with performance verifications of architecture models of real-time embedded systems. We focus on models verified with the real-time scheduling theory...
Alain Plantec, Frank Singhoff, Pierre Dissaux, J&e...
131
Voted
SIGADA
2004
Springer
15 years 8 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
111
Voted
DSOM
2004
Springer
15 years 8 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
122
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna