Sciweavers

2429 search results - page 151 / 486
» Using Aspects to Design a Secure System
Sort
View
SCESM
2006
ACM
239views Algorithms» more  SCESM 2006»
14 years 3 months ago
Aspect-oriented software design with a variant of UML/STD
The notion of aspect is important as a systematic approach to the representation of cross-cutting concerns and the incremental additions of new functionalities to an existing syst...
Shin Nakajima, Tetsuo Tamai
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
14 years 3 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
OPODIS
2003
13 years 10 months ago
dSL: An Environment with Automatic Code Distribution for Industrial Control Systems
Abstract. We present and motivate the definition and use of the language and environment dSL, an imperative and event driven language designed to program distributed industrial co...
Bram De Wachter, Thierry Massart, Cédric Me...
TPCTC
2010
Springer
149views Hardware» more  TPCTC 2010»
13 years 7 months ago
A Discussion on the Design of Graph Database Benchmarks
Graph Database Management systems (GDBs) are gaining popularity. They are used to analyze huge graph datasets that are naturally appearing in many application areas to model interr...
David Dominguez-Sal, Norbert Martínez-Bazan...
MOBISYS
2009
ACM
14 years 9 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...