Sciweavers

101 search results - page 2 / 21
» Formal approach to security metrics.: what does
Sort
View
CODES
2006
IEEE
14 years 4 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst
MFCS
1994
Springer
14 years 2 months ago
"The Big Sweep": On the Power of the Wavefront Approach to Voronoi Diagrams
We show that the wavefront approach to Voronoi diagrams (a deterministic line sweep algorithm that does not use geometric transform) can be generalized to distance measures more g...
Frank K. H. A. Dehne, Rolf Klein
IEEEARES
2008
IEEE
14 years 5 months ago
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
The analysis of business solutions is one of critical issues in industry. Risk is one of the most preeminent and accepted metrics for the evaluation of business solutions. Not sur...
Yudistira Asnar, Rocco Moretti, Maurizio Sebastian...
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 3 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
SACMAT
2010
ACM
14 years 3 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller