Sciweavers

674 search results - page 72 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
EURONGI
2006
Springer
14 years 1 months ago
Joint Connection and Packet Level Analysis in W-CDMA Radio Interface
Abstract. This work introduces a new analytical method for performance evaluation of wireless packet-oriented networks. Unlike traditional call admission control procedures commonl...
Vilius Benetis, Larissa Popova, Villy Bæk Iv...
IEEEARES
2010
IEEE
14 years 5 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
PLDI
2009
ACM
14 years 5 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
DSN
2007
IEEE
14 years 4 months ago
How to Choose a Timing Model?
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer
TPDS
2008
76views more  TPDS 2008»
13 years 10 months ago
How to Choose a Timing Model
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer