Sciweavers

2281 search results - page 47 / 457
» Security Patterns and Secure Systems Design
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
JNCA
2011
185views more  JNCA 2011»
13 years 4 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke
VLSID
2009
IEEE
110views VLSI» more  VLSID 2009»
14 years 10 months ago
Security and Dependability of Embedded Systems: A Computer Architects' Perspective
Jörg Henkel, Roshan G. Ragel, Sri Parameswara...
AAAI
1998
13 years 11 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...
ICRA
2003
IEEE
148views Robotics» more  ICRA 2003»
14 years 3 months ago
Designing a secure and robust mobile interacting robot for the long term
This paper presents the genesis of RoboX. This tour guide robot has been built from the scratch based on the experience of the Autonomous Systems Lab. The production of 11 of thos...
Nicola Tomatis, Gregoire Terrien, Ralph Piguet, Da...