Sciweavers

5475 search results - page 13 / 1095
» Model Driven Security
Sort
View
MSWIM
2006
ACM
14 years 3 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
SAFECOMP
2001
Springer
14 years 2 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...
ASIAN
2003
Springer
126views Algorithms» more  ASIAN 2003»
14 years 1 months ago
Information Flow Security for XML Transformations
Abstract. We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique...
Véronique Benzaken, Marwan Burelle, Giusepp...
ACSAC
2000
IEEE
14 years 2 months ago
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
SE
2007
13 years 11 months ago
PDD applied: A model driven approach
: Property Driven Development is a methodology to check the validity of a distributed application and its conformance to specified requirements. A first prototype supporting this...
Helge Sören Klimek