Sciweavers

2429 search results - page 124 / 486
» Using Aspects to Design a Secure System
Sort
View
DATE
2006
IEEE
107views Hardware» more  DATE 2006»
14 years 3 months ago
Flexible specification and application of rule-based transformations in an automotive design flow
This paper addresses an XML-based design environment, which provides a powerful basis for the manipulation of hardware design descriptions. The contribution of the paper is a flex...
Jan-Hendrik Oetjens, Joachim Gerlach, Wolfgang Ros...
JCM
2007
101views more  JCM 2007»
13 years 9 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
CCS
2007
ACM
14 years 3 months ago
Administration in role-based access control
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify s...
Ninghui Li, Ziqing Mao
IV
2008
IEEE
158views Visualization» more  IV 2008»
14 years 3 months ago
ComVis: A Coordinated Multiple Views System for Prototyping New Visualization Technology
There is a large number of interactive visualization tools, however no universal tool exists that covers all relevant aspects for all possible application domains. We have develop...
Kresimir Matkovic, Wolfgang Freiler, Denis Gracani...
ECIS
2003
13 years 10 months ago
Application of the theory of organized activity to the coordination of social information systems
Co-ordination is seen as a fundamental aspect of organisational activity where computers can help. This is motivated by the need to reconcile the conflicts that arise from the div...
José A. Moinhos Cordeiro, Joaquim Filipe