Sciweavers

1352 search results - page 51 / 271
» Designing Security Requirements Models Through Planning
Sort
View
FOSAD
2000
Springer
14 years 13 days ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
ICRA
2009
IEEE
143views Robotics» more  ICRA 2009»
14 years 3 months ago
Randomized model predictive control for robot navigation
— We suggest a new navigation approach to mobile robots, within a nonlinear model predictive control framework where a navigation function is used as a control Lyapunov function....
Jorge L. Piovesan, Herbert G. Tanner
SOUPS
2005
ACM
14 years 2 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
HIPEAC
2005
Springer
14 years 2 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
OOPSLA
2005
Springer
14 years 2 months ago
Fine-grained interoperability through mirrors and contracts
As a value flows across the boundary between interoperating languages, it must be checked and converted to fit the types and representations of the target language. For simple f...
Kathryn E. Gray, Robert Bruce Findler, Matthew Fla...