Now showing items 1-10 of 10
Security management for mobile ad hoc network of networks (MANoN).
(IGI Publishing, 2010)
Concurrent enforcement of usage control policies.
Deriving enforcement mechanisms for policies
A compositional event and time-based policy model
Dynamic Access Control Policies - Specification and Verification
(Oxford University Press, 2012)
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...
Analysis and run-time verification of dynamic security policies.
The Calculus of context-aware ambients.
We present the Calculus of Context-aware Ambients (CCA in short) for the modelling and verification of mobile systems that are context-aware. This process calculus is built upon the calculus of mobile ambients and introduces ...
A Formal design technique for real-time embedded systems development using duration calculus.
(IEEE Computer Society, 2004)
In this paper we present a syntactical approach for the design of real-time embedded systems. The require- ment of the system is specified as Duration Calculus formula over continuous state variables. We model discretization ...
CCA: a calculus of context-aware ambients.
We present a process calculus, CCA, for the modelling and verification of mobile systems that are context-aware. This process calculus is built upon the calculus of mobile ambients and introduces new constructs to enable ...