Sciweavers

8644 search results - page 77 / 1729
» On the Composition of Secure Systems
Sort
View
AAAI
2012
11 years 11 months ago
Computing Game-Theoretic Solutions and Applications to Security
The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorith...
Vincent Conitzer
FOCS
2010
IEEE
13 years 7 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
GI
2004
Springer
14 years 2 months ago
Towards a Framework and a Design Methodology for Autonomic Integrated Systems
: The transition from microelectronics to nanoelectronics reaches physical limits and results in a paradigm shift in the design and fabrication of electronic circuits. The conserva...
Andreas Herkersdorf, Wolfgang Rosenstiel
CIS
2006
Springer
14 years 23 days ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
OOPSLA
2005
Springer
14 years 2 months ago
A software product line architecture for distributed real-time and embedded systems: a separation of concerns approach
This paper presents a separation of concerns approach to solve the tangling problem of functional and Quality of Service (QoS) concerns in traditional Component-based Software Eng...
Shih-Hsi Liu