Sciweavers

1352 search results - page 86 / 271
» Designing Security Requirements Models Through Planning
Sort
View
OOPSLA
2005
Springer
14 years 2 months ago
fmp and fmp2rsm: eclipse plug-ins for modeling features using model templates
Feature-based model templates have been proposed as a technique for modeling software product lines. We describe a set of tools supporting the technique, namely a feature model ed...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
ICNP
2003
IEEE
14 years 2 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
AGENTS
1998
Springer
14 years 1 months ago
A Hybrid Procedural/Deductive Executive for Autonomous Spacecraft
The New Millennium Remote Agent NMRA will be the rst AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic reco...
Barney Pell, Edward B. Gamble, Erann Gat, Ron Kees...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
KES
2005
Springer
14 years 2 months ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel