Sciweavers

1353 search results - page 37 / 271
» Securing Current and Future Process Control Systems
Sort
View
99
Voted
IEEEIAS
2007
IEEE
15 years 8 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
112
Voted
IEEEARES
2010
IEEE
15 years 7 months ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
SISW
2005
IEEE
15 years 8 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
132
Voted
IROS
2009
IEEE
128views Robotics» more  IROS 2009»
15 years 9 months ago
Predictive constrained gain scheduling for UGV path tracking in a networked control system
– This paper presents a predictive gain scheduler for path tracking control in a networked control system with variable delay. The controller uses the plant model to predict futu...
Bryan R. Klingenberg, Unnati Ojha, Mo-Yuen Chow
USENIX
2001
15 years 3 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley