Sciweavers

781 search results - page 62 / 157
» An Integrated Model for Hybrid Securities
Sort
View
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
14 years 1 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 8 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
IJRR
2006
123views more  IJRR 2006»
13 years 8 months ago
Hybrid Control of the Berkeley Lower Extremity Exoskeleton (BLEEX)
The first functional load-carrying and energetically autonomous exoskeleton was demonstrated at U.C. Berkeley, walking at the average speed of 0.9 m/s (2 mph) while carrying a 34 ...
Hami Kazerooni, Ryan Steger, Lihua Huang
DAGSTUHL
2006
13 years 10 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
14 years 2 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...