Sciweavers

2777 search results - page 12 / 556
» Example centric programming
Sort
View
IFIP
2007
Springer
14 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
ACSAC
2009
IEEE
14 years 4 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 4 months ago
A Process-Centric Approach for Coordinating Product Configuration Decisions
In product family approaches such as software product lines, product configuration is a key activity that deals with the constrained combination and parameterization of reusable c...
Marcílio Mendonça, Donald D. Cowan, ...
INFOCOM
2007
IEEE
14 years 4 months ago
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
—The demand for efficient data dissemination/access techniques to find the relevant data from within a sensor network has led to the development of data-centric sensor networks...
Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao
SELMAS
2004
Springer
14 years 3 months ago
CAMLE: A Caste-Centric Agent-Oriented Modelling Language and Environment
Abstract. This paper presents an agent-oriented modelling language and environment CAMLE. It is based on the conceptual model of multi-agent systems (MAS) proposed and formally def...
Lijun Shan, Hong Zhu