Sciweavers

1150 search results - page 40 / 230
» Specifying Information-Flow Controls
Sort
View
BIRTHDAY
1999
Springer
14 years 1 months ago
Compilation and Synthesis for Real-Time Embedded Controllers
Abstract. This article provides an overview over two constructive approaches to provably correct hard real-time code generation where hard real-time code is generated from abstract...
Martin Fränzle, Markus Müller-Olm
NTMS
2008
IEEE
14 years 3 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
CCE
2004
13 years 9 months ago
Multimodel analysis and controller design for nonlinear processes
Multimodel analysis and controller design for nonlinear processes via gap metric is discussed. It is shown that the loop-shaping H approach can integrate the procedure of selectin...
Wen Tan, Horacio J. Marquez, Tongwen Chen, Ji-zhen...
ICSE
2007
IEEE-ACM
14 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
ACSAC
1998
IEEE
14 years 1 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu