Sciweavers

2255 search results - page 6 / 451
» High Assurance Software Systems
Sort
View
CODASPY
2012
12 years 3 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
DSN
2004
IEEE
13 years 11 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
HASE
2007
IEEE
14 years 1 months ago
A Mobile Agent-based Multi-Robot Design Method for High-Assurance
During the past several years, the area of robot service and multi-robot has grown rapidly. Since this area is a fusion industry consisting of multiple disciplines, it is lack of ...
Sung-Ook Shin, Jung-Oog Lee, Doo-Kwon Baik
DBSEC
1996
125views Database» more  DBSEC 1996»
13 years 8 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi
SP
1996
IEEE
13 years 11 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian