Sciweavers

1352 search results - page 52 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SENSYS
2005
ACM
14 years 2 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
BMVC
2010
13 years 3 months ago
Multi-View Planning for Simultaneous Coverage and Accuracy Optimisation
View planning for three-dimensional (3D) reconstruction and inspection solves the problem of finding an efficient sequence of views allowing complete and high quality reconstructi...
Christoph Munkelt, Andreas Breitbarth, Gunther Not...
CCS
2004
ACM
14 years 2 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
DSS
2007
76views more  DSS 2007»
13 years 8 months ago
Deadline-based escalation in process-aware information systems
Process-aware information systems are typically driven by process models capturing an idealized view of the actual processes. For example, most process models assume that planned ...
Wil M. P. van der Aalst, Michael Rosemann, Marlon ...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova