Sciweavers

2270 search results - page 14 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
OOPSLA
1989
Springer
14 years 2 days ago
PCLOS: A Critical Review
This paper uses the persistent object system PCLOS to survey some problems and bene ts of object persistence. The system is analyzed along several relevant dimensions. PCLOS provi...
Andreas Paepcke
ACSAC
2005
IEEE
14 years 2 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
MHCI
2005
Springer
14 years 2 months ago
Survey of position location techniques in mobile systems
The growth of mobile technology has made recording of user’s location possible. The systems that intent to use location in order to register user’s movement and to use the gen...
Thanos Manesis, Nikolaos M. Avouris
TASE
2008
IEEE
13 years 8 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
JNSM
2007
97views more  JNSM 2007»
13 years 8 months ago
Policy-based Management: A Historical Perspective
This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960’s until today’s more elaborate framewo...
Raouf Boutaba, Issam Aib