Sciweavers

123 search results - page 18 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
SERP
2007
13 years 8 months ago
Using Constraints with Action Language for Model Evolution
- Since the advent of model driven software engineering (MDSE) it has become necessary to develop techniques and tools for model evolution. In this paper we examine two issues and ...
Shahid Alam, Samuel A. Ajila
SOSP
2005
ACM
14 years 3 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 6 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
SOUPS
2010
ACM
13 years 10 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ECMDAFA
2006
Springer
136views Hardware» more  ECMDAFA 2006»
13 years 10 months ago
Finding a Path to Model Consistency
A core problem in Model Driven Engineering is model consistency achievement: all models must satisfy relationships constraining them. Active consistency techniques monitor and cont...
Gregory de Fombelle, Xavier Blanc, Laurent Rioux, ...