Abstract. This article provides an overview over two constructive approaches to provably correct hard real-time code generation where hard real-time code is generated from abstract...
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Multimodel analysis and controller design for nonlinear processes via gap metric is discussed. It is shown that the loop-shaping H approach can integrate the procedure of selectin...
Wen Tan, Horacio J. Marquez, Tongwen Chen, Ji-zhen...
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...