Sciweavers

341 search results - page 39 / 69
» A Security Engineering Process based on Patterns
Sort
View
TKDE
2008
177views more  TKDE 2008»
15 years 2 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
123
Voted
ANCS
2006
ACM
15 years 6 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
131
Voted
ICSE
2000
IEEE-ACM
15 years 6 months ago
Object-oriented modeling: a roadmap
Object-oriented modeling has become the de-facto standard in the early phases of a software development process during the last decade. The current state-of-the-art is dominated b...
Gregor Engels, Luuk Groenewegen
ICCAD
1999
IEEE
148views Hardware» more  ICCAD 1999»
15 years 6 months ago
SAT based ATPG using fast justification and propagation in the implication graph
In this paper we present new methods for fast justification and propagation in the implication graph (IG) which is the core data structure of our SAT based implication engine. As ...
Paul Tafertshofer, Andreas Ganz
ICCSA
2003
Springer
15 years 7 months ago
Digital Styling for Designers: Sketch Emulation in Computer Environment
Abstract. The digitalization of product-styling tools for the early designdevelopment stage has focused on using raster-type graphics S/Ws. These kinds of S/Ws enable designers fre...
Seok-Hyung Bae, Won-Sup Kim, Eun-Sook Kwon