Sciweavers

327 search results - page 17 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
TASE
2008
IEEE
13 years 9 months ago
Modeling and Supervisory Control of Railway Networks Using Petri Nets
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...
Alessandro Giua, Carla Seatzu
VTS
2007
IEEE
103views Hardware» more  VTS 2007»
14 years 3 months ago
At-Speed Testing of Core-Based System-on-Chip Using an Embedded Micro-Tester
In SoC designs, limited test access to internal cores, lowcost external tester’s lack of accuracy and slow frequencies make application of at-speed tests impractical. Therefore,...
Matthieu Tuna, Mounir Benabdenbi, Alain Greiner
CCS
2005
ACM
14 years 2 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
14 years 1 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
SACMAT
2010
ACM
14 years 1 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller