Sciweavers

410 search results - page 46 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
IBERAMIA
2004
Springer
14 years 1 months ago
Checking Social Properties of Multi-agent Systems with Activity Theory
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
IADIS
2003
13 years 9 months ago
How Can Agents Help Improving the Performance of a Human Team
The contribution of intelligent agents for the human team performance is a challenging problem. This paper introduces a study to help clarifying this issue, starting with the moti...
Mauro Nunes, Henrique O'Neill
IEEEARES
2008
IEEE
14 years 2 months ago
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Marti...
OOPSLA
2001
Springer
14 years 4 days ago
A Categorization of Classes based on the Visualization of their Internal Structure: The Class Blueprint
The reengineering and reverse engineering of software systems is gaining importance in software industry, because the accelerated turnover in software companies creates legacy sys...
Michele Lanza, Stéphane Ducasse
CSFW
2008
IEEE
14 years 2 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang