Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
In this paper, we propose a methodology for developing component-based real-time systems based on the concept of hierarchical scheduling. Recently, much work has been devoted to t...
Language-centric methodologies, triggered by the success of Domain Specific Languages, rely on precise specifications of modeling s. While the definition of the abstract syntax ...
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
Graphs are a commonly used formalism for modeling many different kinds of static and dynamic data. In many applications, data modeling can be improved by using hierarchically struc...
Giorgio Busatto, Gregor Engels, Katharina Mehner, ...