Sciweavers

2043 search results - page 66 / 409
» Reasoning About Security Models
Sort
View
PUC
2006
72views more  PUC 2006»
13 years 10 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
OOPSLA
2009
Springer
14 years 4 months ago
S.P.L.O.T.: software product lines online tools
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...
Marcílio Mendonça, Moises Branco, Do...
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 4 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
VL
2000
IEEE
115views Visual Languages» more  VL 2000»
14 years 2 months ago
SD2: A Sound and Complete Diagrammatic Reasoning System
SD2 is a system of Venn-type diagrams that can be used to reason diagrammatically about sets, their cardinalities and their relationships. They augment the systems of Venn-Peirce ...
John Howse, Fernando Molina, John Taylor
OTM
2005
Springer
14 years 3 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert