Sciweavers

418 search results - page 32 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
CMS
2006
175views Communications» more  CMS 2006»
13 years 10 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
IFIP11
2004
114views Business» more  IFIP11 2004»
13 years 10 months ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
EMISAIJ
2010
13 years 3 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
ACSD
2006
IEEE
102views Hardware» more  ACSD 2006»
13 years 10 months ago
Models of Computation for Networks on Chip
Networks on chip platforms offer the opportunity to introduce a new abstraction level that defines a set of platform services with performance and power characteristics. By making...
Axel Jantsch
CDC
2008
IEEE
143views Control Systems» more  CDC 2008»
14 years 3 months ago
A nonlinear, control-oriented model for ionic polymer-metal composite actuators
Ionic polymer-metal composites (IPMCs) form an important category of electroactive polymers and have many potential applications in biomedical, robotic and micro/nano manipulation ...
Zheng Chen, Dawn R. Hedgepeth, Xiaobo Tan