-
2
-
-
0041876237
-
Software infrastructure and design challenges for ubiquitous computing applications
-
December
-
Banavar, G., & Bernstein, A. (2002, December). Software infrastructure and design challenges for ubiquitous computing applications. Communications of the ACM, 45(12), 92-6.
-
(2002)
Communications of the ACM
, vol.45
, Issue.12
, pp. 92-96
-
-
Banavar, G.1
Bernstein, A.2
-
4
-
-
84899298100
-
Testing conformance of real-time software by automatic generation of observers
-
Retrieved January 2005, from
-
Bensalem S., Bozga, M., Krichen, M., & Tripakis, S. (2004). Testing conformance of real-time software by automatic generation of observers. Proceedings of the 4th Workshop on Runtime Verification (RV'04). Retrieved January 2005, from http://ase.arc.nasa.gov/rv2004
-
(2004)
Proceedings of the 4th Workshop On Runtime Verification (RV'04)
-
-
Bensalem, S.1
Bozga, M.2
Krichen, M.3
Tripakis, S.4
-
6
-
-
84899246624
-
-
September, High Assurance Systems Workshop (RHAS03), Monterey Bay, CA
-
Cheng, B. H. C., Konrad, S., Campbell, L. A., & Wassermann, R. (2003, September). Using security patterns to model and analyze security requirements. High Assurance Systems Workshop (RHAS03), Monterey Bay, CA.
-
(2003)
Using Security Patterns to Model and Analyze Security Requirements
-
-
Cheng, B.H.C.1
Konrad, S.2
Campbell, L.A.3
Wassermann, R.4
-
7
-
-
0030615546
-
Automatic monitoring of software requirements
-
Cohen, D., Feather, M., Narayanaswamy, K, & Fickas, S. (1997). Automatic monitoring of software requirements. Proceedings of the 19th International Conference on Software Engineering.
-
(1997)
Proceedings of the 19th International Conference On Software Engineering
-
-
Cohen, D.1
Feather, M.2
Narayanaswamy, K.3
Fickas, S.4
-
8
-
-
84944048132
-
The ponder policy specification language
-
LNCS. Berlin Heidelberg: Springer-Verlag
-
Damianou, N., Dulay, N., Lupu, E., & Sloman, M. (2001). The ponder policy specification language. POLICY 2001 (pp. 18-38). LNCS. Berlin Heidelberg: Springer-Verlag.
-
(2001)
POLICY 2001
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
9
-
-
34247327703
-
Towards self-protecting ubiquitous systems monitoring trust-based interactions
-
English, C., Terzis, S., & Nixon, P. (2004). Towards self-protecting ubiquitous systems monitoring trust-based interactions. Proceedings of UbiSys ' 04.
-
(2004)
Proceedings of UbiSys ' 04
-
-
English, C.1
Terzis, S.2
Nixon, P.3
-
14
-
-
84869126525
-
Toward principles for the design of ontologies used for knowledge sharing
-
In N. Guarino & R. Poli (Eds.), Dordrecht, The Netherlands: Kluwer Academic Publishers
-
Gruber, T. R. (1993). Toward principles for the design of ontologies used for knowledge sharing. In N. Guarino & R. Poli (Eds.), Formal ontology in conceptual analysis and knowledge representation. Dordrecht, The Netherlands: Kluwer Academic Publishers.
-
(1993)
Formal Ontology In Conceptual Analysis and Knowledge Representation
-
-
Gruber, T.R.1
-
15
-
-
35048850964
-
-
IBM's Security Strategy team, An IBM White Paper. Retrieved from
-
IBM's Security Strategy team (2004). Introduction to business security patterns. An IBM White Paper. Retrieved from http://www-3.ibm.com/security/patterns/intro.pdf
-
(2004)
Introduction to Business Security Patterns
-
-
-
19
-
-
3042595025
-
An extensible framework for practical secure component composition in a ubiquitous computing environment
-
April, Las Vegas, USA
-
Llewellyn-Jones, D., Merabti, M., Shi, Q., & Askwith, B. (2004, April). An extensible framework for practical secure component composition in a ubiquitous computing environment. Proceedings of International Conference on Information Technology, Las Vegas, USA.
-
(2004)
Proceedings of International Conference On Information Technology
-
-
Llewellyn-Jones, D.1
Merabti, M.2
Shi, Q.3
Askwith, B.4
-
20
-
-
34250197762
-
Access control infrastructure for digital objects
-
LNCS. 2513. Singapore: Springer-Verlag
-
López, J., Maña, A., Pimentel, E., Troya, J. M., & Yagüe, M. I. (2002). Access control infrastructure for digital objects. International Conference on Information and Communications Security 2002. LNCS. 2513. Singapore: Springer-Verlag.
-
(2002)
International Conference On Information and Communications Security 2002
-
-
López, J.1
Maña, A.2
Pimentel, E.3
Troya, J.M.4
Yagüe, M.I.5
-
22
-
-
33747127813
-
Run-time monitoring of requirements for systems composed of Web-services: Initial implementation and evaluation experience
-
(ICWS 2005)
-
Mahbub, K., & Spanoudakis, G. (2005). Run-time monitoring of requirements for systems composed of Web-services: Initial implementation and evaluation experience. The 3rd International IEEE Conference on Web Services (ICWS 2005).
-
(2005)
The 3rd International IEEE Conference On Web Services
-
-
Mahbub, K.1
Spanoudakis, G.2
-
23
-
-
2642562842
-
Integrating & automating security engineering in UML
-
New York: Acta Press
-
Maña, A., Montenegro, J. A., Ray, D., Sánchez, F., & Yagüe, M. I. (2003). Integrating & automating security engineering in UML. IASTED International Conference on Communication, Network and Information Security (CNIS'03). New York: Acta Press.
-
(2003)
IASTED International Conference On Communication, Network and Information Security (CNIS'03)
-
-
Maña, A.1
Montenegro, J.A.2
Ray, D.3
Sánchez, F.4
Yagüe, M.I.5
-
25
-
-
84899400257
-
-
Object Management Group. (OMG). Common Object Request Broker Architecture (CORBA) Core Specification. Retrieved July 2004, from
-
Object Management Group. (OMG). Common Object Request Broker Architecture (CORBA) Core Specification. Retrieved July 2004, from http://www.omg.org
-
-
-
-
28
-
-
33845645782
-
Gaia: A middleware infrastructure to enable active spaces
-
October-December
-
Román, M., Hess, C. K., Cerqueira, R., Ranganathan, A., Campbell, R. H., & Nahrstedt, K. (2002, October-December). Gaia: A middleware infrastructure to enable active spaces. Proceedings of IEEE Pervasive Computing (pp. 74-83).
-
(2002)
Proceedings of IEEE Pervasive Computing
, pp. 74-83
-
-
Román, M.1
Hess, C.K.2
Cerqueira, R.3
Ranganathan, A.4
Campbell, R.H.5
Nahrstedt, K.6
-
30
-
-
0038601427
-
Patterns, frameworks, and middleware: Their synergestic relationships
-
May 3-10, Portland, Oregon
-
Schmidt, D. C. (2003, May 3-10). Patterns, frameworks, and middleware: Their synergestic relationships. Invited talk at IEEE/ACM International Conference on Software Engineering, Portland, Oregon.
-
(2003)
Invited Talk At IEEE/ACM International Conference On Software Engineering
-
-
Schmidt, D.C.1
-
33
-
-
0032202421
-
An effective model for composition of secure systems
-
November
-
Shi, Q., & Zhang, N. (1998, November). An effective model for composition of secure systems. Journal of Systems and Software, 43(3), 233-44.
-
(1998)
Journal of Systems and Software
, vol.43
, Issue.3
, pp. 233-244
-
-
Shi, Q.1
Zhang, N.2
-
34
-
-
33745451350
-
Monitoring algorithms for metric temporal logic specifications
-
Retrieved January 2005, from
-
Thati, P., & Rosu, G. (2004). Monitoring algorithms for metric temporal logic specifications. Proceedings of the 4th Workshop on Runtime Verification (RV '04). Retrieved January 2005, from http://ase.arc.nasa.gov/rv2004/
-
(2004)
Proceedings of the 4th Workshop On Runtime Verification (RV '04)
-
-
Thati, P.1
Rosu, G.2
-
35
-
-
0035780469
-
Embedding security practices in contemporary information systems development approaches
-
Tryfonas, T., Kiountouzis, E., & Poulymenakou, A. (2001). Embedding security practices in contemporary information systems development approaches. Information Management & Computer Security, 9(4), 183-197.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.4
, pp. 183-197
-
-
Tryfonas, T.1
Kiountouzis, E.2
Poulymenakou, A.3
-
36
-
-
84883274584
-
Extended description techniques for security engineering
-
In M. Dupuy & P. Paradinas (Eds.), Paris: Kluwer Academic Publishers
-
Wimmel, G., & Wisspeintner, A. (2001). Extended description techniques for security engineering. In M. Dupuy & P. Paradinas (Eds.), Trusted information: The new decade challenge, IFIP TC11. The 16th International Conference on Information Security (IFIP/Sec'01) (pp. 470-485). Paris: Kluwer Academic Publishers.
-
(2001)
Trusted Information: The New Decade Challenge, IFIP TC11. the 16th International Conference On Information Security (IFIP/Sec'01)
, pp. 470-485
-
-
Wimmel, G.1
Wisspeintner, A.2
-
38
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
February
-
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004, February). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38-47.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
|