Sciweavers

1352 search results - page 149 / 271
» Designing Security Requirements Models Through Planning
Sort
View
KBSE
2007
IEEE
14 years 4 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
IPL
2008
72views more  IPL 2008»
13 years 10 months ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
MOBIQUITOUS
2008
IEEE
14 years 4 months ago
A multi-dimensional model enabling autonomic reasoning for context-aware pervasive applications
A fundamental requirement for autonomic computing is to be able to automatically infer how human users react in similar contextual conditions. This paper examines the problem of a...
Nearchos Paspallis, Konstantinos Kakousis, George ...
WSC
1998
13 years 11 months ago
Modeling at the Machine-Control Level Using Discrete Event Simulation (DES)
Simulation at the machine-control level plays an important role in designing machine controls and operational specifications. Recently, there has been a considerable amount of wor...
Raid Al-Aomar, Daniel Cook
IACR
2011
221views more  IACR 2011»
12 years 9 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...