Sciweavers

1352 search results - page 21 / 271
» Designing Security Requirements Models Through Planning
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 9 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
133
Voted
B
2007
Springer
15 years 7 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
WSC
1997
15 years 4 months ago
Simulation-based Planning for Multi-Agent Environments
One of the key issues in reasoning with multiple interacting intelligent agents is how to model and code the decision making process of the agents. In Artificial Intelligence (AI...
Jin Joo Lee, Paul A. Fishwick
113
Voted
ER
1999
Springer
105views Database» more  ER 1999»
15 years 7 months ago
Modeling Interactive Web Sources for Information Mediation
We propose a method for modeling complex Web sources that have active user interaction requirements. Here active" refers to the fact that certain information in these sources ...
Bertram Ludäscher, Amarnath Gupta
126
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 9 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich