Sciweavers

2270 search results - page 28 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
DATE
2008
IEEE
129views Hardware» more  DATE 2008»
14 years 3 months ago
Quantitative Evaluation in Embedded System Design: Trends in Modeling and Analysis Techniques
The evaluation of extra-functional properties of embedded systems, such as reliability, timeliness, and energy consumption, as well as dealing with uncertainty, e.g., in the timin...
Joost-Pieter Katoen
IASTEDSEA
2004
13 years 10 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
CAISE
2004
Springer
14 years 2 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
SSDBM
1992
IEEE
125views Database» more  SSDBM 1992»
14 years 21 days ago
Modelling Ecological Data
Ecological surveys generate large quantities of data database technology has not yet reached its full potential in this area. Here we investigate approaches to modelling ecologica...
Peter J. Barclay, Jessie B. Kennedy
JDCTA
2010
182views more  JDCTA 2010»
13 years 3 months ago
Fusion Techniques for Reliable Information: A Survey
Information fused by multi-sensors is an important factor for obtaining reliable contextual information in smart spaces which use the pervasive and ubiquitous computing techniques...
Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elm...