Sciweavers

762 search results - page 36 / 153
» Security Contexts in Autonomic Systems
Sort
View
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 4 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
JPDC
2007
86views more  JPDC 2007»
13 years 9 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
ACSAC
2005
IEEE
14 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
ROMAN
2007
IEEE
173views Robotics» more  ROMAN 2007»
14 years 4 months ago
Situation-Aware Interpretation, Planning and Execution of User Commands by Autonomous Robots
— For a robot to be able to first understand and then achieve a human’s goals, it must be able to reason about a) the context of the current situation (with respect to which i...
Michael Brenner
TSE
2008
107views more  TSE 2008»
13 years 9 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...