Sciweavers

2429 search results - page 34 / 486
» Using Aspects to Design a Secure System
Sort
View
CCS
2008
ACM
13 years 9 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
SIGSOFT
2006
ACM
14 years 8 months ago
Exceptions and aspects: the devil is in the details
It is usually assumed that the implementation of exception handling can be better modularized by the use of aspectoriented programming (AOP). However, the trade-offs involved in u...
Alessandro Garcia, Cecília M. F. Rubira, Ed...
WSC
2008
13 years 10 months ago
A simulation based system for analysis and design of production control systems
We present aspects of a simulated based system for analyzing and designing production control systems. The core of the system is a simulation of a manufacturing system operating w...
Corinne MacDonald, Eldon A. Gunn
EDOC
2007
IEEE
14 years 2 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey
JCS
2011
156views more  JCS 2011»
13 years 2 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran