Sciweavers

1288 search results - page 93 / 258
» Securing aspect composition
Sort
View
MSOM
2010
65views more  MSOM 2010»
13 years 5 months ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho
ATC
2007
Springer
14 years 2 months ago
Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay
Service-based Systems (SBS) have the advantage of composing distributed systems from various services provided by multiple providers transparently. In addition to functional correc...
Stephen S. Yau, Min Yan, Dazhi Huang
ASIAN
2009
Springer
308views Algorithms» more  ASIAN 2009»
13 years 11 months ago
Automated Security Proof for Symmetric Encryption Modes
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Martin Gagné, Pascal Lafourcade, Yassine La...
VLSID
2006
IEEE
153views VLSI» more  VLSID 2006»
14 years 10 months ago
An Asynchronous Interconnect Architecture for Device Security Enhancement
We present a new style of long-distance, on-chip interconnect, based loosely on the asynchronous GasP architecture. It has a number of advantages over conventional designs, the mo...
Simon Hollis, Simon W. Moore
ENTCS
2008
150views more  ENTCS 2008»
13 years 10 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...