Sciweavers

1352 search results - page 16 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
SOCO
2008
Springer
13 years 7 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
ITCC
2005
IEEE
14 years 1 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
ICRA
1999
IEEE
118views Robotics» more  ICRA 1999»
13 years 12 months ago
Rapid Physics-Based Rough-Terrain Rover Planning with Sensor and Control Uncertainty
In future planetary exploration missions, rovers will be required to autonomously traverse challenging environments. Much of the previous work in robot motion planning cannot be s...
Karl Iagnemma, Frank Génot, Steven Dubowsky
DAC
2006
ACM
14 years 1 months ago
How will the fabless model survive?
The fabless model was traditionally enabled through clean interfaces – both in technical and business terms – between foundries and fabless semiconductor companies. However, w...
Thomas Hartung, Jim Kupec, Ana Hunter, Brad Paulse...