Sciweavers

183 search results - page 19 / 37
» Safety analysis of usage control authorization models
Sort
View
CAV
2006
Springer
133views Hardware» more  CAV 2006»
14 years 10 days ago
Programs with Lists Are Counter Automata
Abstract. We address the verification problem of programs manipulating oneselector linked data structures. We propose a new automated approach for checking safety and termination f...
Ahmed Bouajjani, Marius Bozga, Peter Habermehl, Ra...
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 10 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
TASE
2007
IEEE
14 years 2 months ago
Realizing Live Sequence Charts in SystemVerilog
The design of an embedded control system starts with an investigation of properties and behaviors of the process evolving within its environment, and an analysis of the requiremen...
Hai H. Wang, Shengchao Qin, Jun Sun 0001, Jin Song...
ICPPW
2003
IEEE
14 years 1 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
CORR
2011
Springer
139views Education» more  CORR 2011»
13 years 3 months ago
A Science Model Driven Retrieval Prototype
This paper is about a better understanding on the structure and dynamics of science and the usage of these insights for compensating the typical problems that arises in metadata-d...
Philipp Mayr, Philipp Schaer, Peter Mutschke