Sciweavers

1352 search results - page 49 / 271
» Designing Security Requirements Models Through Planning
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
13 years 10 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
ISER
2004
Springer
182views Robotics» more  ISER 2004»
14 years 2 months ago
Nonholonomic Modeling of Needle Steering
As a flexible needle with a bevel tip is pushed through soft tissue, the asymmetry of the tip causes the needle to bend. We propose that, by using nonholonomic kinematics, contro...
Robert J. Webster III, Noah J. Cowan, Gregory S. C...
IFIP
2001
Springer
14 years 1 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
CPAIOR
2004
Springer
14 years 17 days ago
Building Models through Formal Specification
Abstract. Over the past years, a number of increasingly expressive languages for modelling constraint and optimisation problems have evolved. In developing a strategy to ease the c...
Gerrit Renker, Hatem Ahriz
KES
2005
Springer
14 years 2 months ago
Optimal Remediation Design in Groundwater Systems by Intelligent Techniques
Abstract. This research develops an optimal planning model for pump-treatinject based groundwater remediation systems. Optimizing the design of the pump-treat-inject system is a no...
Hone-Jay Chu, Chin-Tsai Hsiao, Liang-Cheng Chang