Sciweavers

1495 search results - page 109 / 299
» Modeling and controllability for a class of hybrid mechanica...
Sort
View
DRM
2007
Springer
14 years 3 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 10 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
RTSS
1998
IEEE
14 years 1 months ago
Membership Questions for Timed and Hybrid Automata
Timed and hybrid automata are extensions of finite-state machines for formal modeling of embedded systems with both discrete and continuous components. Reachability problems for t...
Rajeev Alur, Robert P. Kurshan, Mahesh Viswanathan
ICMCS
1996
IEEE
123views Multimedia» more  ICMCS 1996»
14 years 1 months ago
Dynamic QoS Control Based on the QoS-Ticket Model
The most notable characteristic of continuous-media data is the existence of timing constraints. To handle such data appropriately, some system support for resource management and...
Kiyokuni Kawachiya, Hideyuki Tokuda
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 3 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh