Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
This position paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source cod...
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...