Sciweavers

427 search results - page 23 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
ELECTRONICMARKETS
2011
140views more  ELECTRONICMARKETS 2011»
13 years 1 months ago
Reaching into patients' homes - participatory designed AAL services - The case of a patient-centered nutrition tracking service
Abstract Ambient Assisted Living (AAL) offers possibilities for promising new IT-based health care services that are resulting in new challenges for its design process. We introduc...
Philipp Menschner, Andreas Prinz, Philip Koene, Fe...
CCS
2007
ACM
14 years 1 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
OOPSLA
2005
Springer
14 years 1 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
CSREASAM
2006
13 years 9 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
ATAL
2010
Springer
13 years 8 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio