Sciweavers

434 search results - page 33 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
WISTP
2010
Springer
13 years 6 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 1 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
PPDP
2005
Springer
14 years 2 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost
ICC
2007
IEEE
14 years 3 months ago
A Grammar for Specifying Usage Control Policies
—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently propose...
Rafael Teigao, Carlos Maziero, Altair Olivo Santin
HASE
2007
IEEE
14 years 25 days ago
Goal-Oriented Patterns for UML-Based Modeling of Embedded Systems Requirements
Embedded systems are used for critical applications that must adhere to safety constraints. Developers of these systems face three key challenges when attempting to apply existing...
Heather Goldsby, Sascha Konrad, Betty H. C. Cheng